{"url":"http://public2.vulnerablecode.io/api/packages/86883?format=json","purl":"pkg:rpm/redhat/webkitgtk4@2.48.3-2?arch=el7_9","type":"rpm","namespace":"redhat","name":"webkitgtk4","version":"2.48.3-2","qualifiers":{"arch":"el7_9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74669?format=json","vulnerability_id":"VCID-1164-uckc-qfbs","summary":"webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40789","reference_id":"","reference_type":"","scores":[{"value":"0.00696","scoring_system":"epss","scoring_elements":"0.71921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.7325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73269","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73289","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067","reference_id":"2302067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/kb/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/kb/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40789"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1164-uckc-qfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73819?format=json","vulnerability_id":"VCID-1e6d-p4fv-rubk","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27808","reference_id":"","reference_type":"","scores":[{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.7442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77899","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314697","reference_id":"2314697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314697"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27808"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59527?format=json","vulnerability_id":"VCID-1fqx-3rnb-13bh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30953","reference_id":"","reference_type":"","scores":[{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.6508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.6513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65186","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65163","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044542","reference_id":"2044542","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044542"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30953"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fqx-3rnb-13bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49521?format=json","vulnerability_id":"VCID-1jqe-8r7j-zfdu","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42856.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42856","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40518","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40545","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40467","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40549","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40512","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/12/26/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/12/26/1"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/21","reference_id":"21","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153683","reference_id":"2153683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2153683"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/22","reference_id":"22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/22"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213516","reference_id":"HT213516","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"https://support.apple.com/en-us/HT213516"},{"reference_url":"https://support.apple.com/en-us/HT213531","reference_id":"HT213531","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"https://support.apple.com/en-us/HT213531"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0016","reference_id":"RHSA-2023:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0021","reference_id":"RHSA-2023:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5797-1/","reference_id":"USN-5797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5797-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42856"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jqe-8r7j-zfdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59483?format=json","vulnerability_id":"VCID-1kyj-dxw1-q7a6","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1817.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1817","reference_id":"","reference_type":"","scores":[{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76569","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986852","reference_id":"1986852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986852"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-1817"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1kyj-dxw1-q7a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61837?format=json","vulnerability_id":"VCID-1xcs-fpk3-nyg4","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44187","reference_id":"","reference_type":"","scores":[{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67584","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67616","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706","reference_id":"2314706","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7079-1/","reference_id":"USN-7079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7079-1/"}],"fixed_packages":[],"aliases":["CVE-2024-44187"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33722?format=json","vulnerability_id":"VCID-2a1d-w9tn-x3h6","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38600","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7113","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/08/02/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/08/02/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231021","reference_id":"2231021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231021"},{"reference_url":"https://www.debian.org/security/2023/dsa-5468","reference_id":"dsa-5468","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://www.debian.org/security/2023/dsa-5468"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213841","reference_id":"HT213841","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213841"},{"reference_url":"https://support.apple.com/en-us/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213843"},{"reference_url":"https://support.apple.com/en-us/HT213846","reference_id":"HT213846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213846"},{"reference_url":"https://support.apple.com/en-us/HT213847","reference_id":"HT213847","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213847"},{"reference_url":"https://support.apple.com/en-us/HT213848","reference_id":"HT213848","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213848"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/","reference_id":"KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/","reference_id":"KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38600"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2a1d-w9tn-x3h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31099?format=json","vulnerability_id":"VCID-2b9d-cej9-w3hq","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9895.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9895.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9895","reference_id":"","reference_type":"","scores":[{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.86194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.86204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.86218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.86237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.86248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.86262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02865","scoring_system":"epss","scoring_elements":"0.86256","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879538","reference_id":"1879538","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879538"},{"reference_url":"https://security.gentoo.org/glsa/202007-61","reference_id":"GLSA-202007-61","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4444-1/","reference_id":"USN-4444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4444-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9895"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2b9d-cej9-w3hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61840?format=json","vulnerability_id":"VCID-2nmg-6jk2-ebcb","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44296","reference_id":"","reference_type":"","scores":[{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71214","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.712","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121563","reference_id":"121563","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121563"},{"reference_url":"https://support.apple.com/en-us/121564","reference_id":"121564","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121564"},{"reference_url":"https://support.apple.com/en-us/121565","reference_id":"121565","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121565"},{"reference_url":"https://support.apple.com/en-us/121566","reference_id":"121566","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121566"},{"reference_url":"https://support.apple.com/en-us/121567","reference_id":"121567","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121567"},{"reference_url":"https://support.apple.com/en-us/121569","reference_id":"121569","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121569"},{"reference_url":"https://support.apple.com/en-us/121571","reference_id":"121571","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121571"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323289","reference_id":"2323289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323289"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9545","reference_id":"RHSA-2024:9545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7113-1/","reference_id":"USN-7113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7113-1/"}],"fixed_packages":[],"aliases":["CVE-2024-44296"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61844?format=json","vulnerability_id":"VCID-2rm2-f5xj-1bb2","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24208","reference_id":"","reference_type":"","scores":[{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54608","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357910","reference_id":"2357910","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357910"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24208"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59520?format=json","vulnerability_id":"VCID-2umj-w8zs-m3em","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30889","reference_id":"","reference_type":"","scores":[{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71677","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034386","reference_id":"2034386","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034386"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30889"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2umj-w8zs-m3em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31097?format=json","vulnerability_id":"VCID-2vkd-zenq-eugp","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9893.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9893.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9893","reference_id":"","reference_type":"","scores":[{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.8428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02179","scoring_system":"epss","scoring_elements":"0.84348","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879535","reference_id":"1879535","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879535"},{"reference_url":"https://security.gentoo.org/glsa/202007-61","reference_id":"GLSA-202007-61","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4444-1/","reference_id":"USN-4444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4444-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9893"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vkd-zenq-eugp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72615?format=json","vulnerability_id":"VCID-2vtf-gudd-9fah","summary":"WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54479","reference_id":"","reference_type":"","scores":[{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-08T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72001","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121838","reference_id":"121838","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121838"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333841","reference_id":"2333841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[],"aliases":["CVE-2024-54479"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59512?format=json","vulnerability_id":"VCID-37kv-4cp4-5fas","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30846","reference_id":"","reference_type":"","scores":[{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.6608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.6611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66091","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017898","reference_id":"2017898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017898"},{"reference_url":"https://security.archlinux.org/ASA-202110-10","reference_id":"ASA-202110-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-10"},{"reference_url":"https://security.archlinux.org/ASA-202110-9","reference_id":"ASA-202110-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-9"},{"reference_url":"https://security.archlinux.org/AVG-2483","reference_id":"AVG-2483","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2483"},{"reference_url":"https://security.archlinux.org/AVG-2484","reference_id":"AVG-2484","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2484"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5127-1/","reference_id":"USN-5127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5127-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30846"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37kv-4cp4-5fas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33709?format=json","vulnerability_id":"VCID-3ab6-tntn-67eb","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28204","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21639","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209208","reference_id":"2209208","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209208"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213757","reference_id":"HT213757","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213757"},{"reference_url":"https://support.apple.com/en-us/HT213758","reference_id":"HT213758","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213758"},{"reference_url":"https://support.apple.com/en-us/HT213761","reference_id":"HT213761","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213761"},{"reference_url":"https://support.apple.com/en-us/HT213762","reference_id":"HT213762","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213762"},{"reference_url":"https://support.apple.com/en-us/HT213764","reference_id":"HT213764","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213764"},{"reference_url":"https://support.apple.com/en-us/HT213765","reference_id":"HT213765","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3432","reference_id":"RHSA-2023:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3433","reference_id":"RHSA-2023:3433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[],"aliases":["CVE-2023-28204"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ab6-tntn-67eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61836?format=json","vulnerability_id":"VCID-3daw-8nh6-dfcq","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11511","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263","reference_id":"2323263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-44185"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60125?format=json","vulnerability_id":"VCID-3ed7-5bwx-5fd3","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9803.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9803","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49008","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48961","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49011","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879557","reference_id":"1879557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879557"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9803"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ed7-5bwx-5fd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71950?format=json","vulnerability_id":"VCID-3frv-ppjt-9bdy","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24143","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32581","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344621","reference_id":"2344621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24143"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3frv-ppjt-9bdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59500?format=json","vulnerability_id":"VCID-3ghs-su4t-cqg7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30744","reference_id":"","reference_type":"","scores":[{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.6969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69755","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986888","reference_id":"1986888","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986888"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30744"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ghs-su4t-cqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33720?format=json","vulnerability_id":"VCID-3r9c-5ys2-43hw","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38597","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67457","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231043","reference_id":"2231043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231043"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38597"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3r9c-5ys2-43hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41467?format=json","vulnerability_id":"VCID-3udf-shtq-g7br","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1799.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1799","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31983","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32024","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944340","reference_id":"1944340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944340"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1799"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3udf-shtq-g7br"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41971?format=json","vulnerability_id":"VCID-3yjx-gswx-g3gt","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23213","reference_id":"","reference_type":"","scores":[{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60394","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60341","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60362","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120306","reference_id":"120306","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120306"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120310","reference_id":"120310","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120310"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270141","reference_id":"2270141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270141"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/27"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/33","reference_id":"33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/33"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/36","reference_id":"36","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/36"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/39","reference_id":"39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/39"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/40","reference_id":"40","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/40"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214055"},{"reference_url":"https://support.apple.com/kb/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214055"},{"reference_url":"https://support.apple.com/en-us/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214056"},{"reference_url":"https://support.apple.com/kb/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214056"},{"reference_url":"https://support.apple.com/en-us/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214059"},{"reference_url":"https://support.apple.com/kb/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214059"},{"reference_url":"https://support.apple.com/en-us/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214060"},{"reference_url":"https://support.apple.com/kb/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214060"},{"reference_url":"https://support.apple.com/en-us/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214061"},{"reference_url":"https://support.apple.com/kb/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214061"},{"reference_url":"https://support.apple.com/en-us/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214063"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/","reference_id":"US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/"},{"reference_url":"https://usn.ubuntu.com/6631-1/","reference_id":"USN-6631-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6631-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/","reference_id":"X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/"}],"fixed_packages":[],"aliases":["CVE-2024-23213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3yjx-gswx-g3gt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41979?format=json","vulnerability_id":"VCID-455j-vpxx-yudd","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23284","reference_id":"","reference_type":"","scores":[{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.7543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.7538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120880","reference_id":"120880","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120880"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270292","reference_id":"2270292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270292"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/26","reference_id":"26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","reference_id":"AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","reference_id":"BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214082","reference_id":"HT214082","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214082"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214087","reference_id":"HT214087","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214087"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","reference_id":"PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2024-23284"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-455j-vpxx-yudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62517?format=json","vulnerability_id":"VCID-48jv-7tnc-8fb3","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22620","reference_id":"","reference_type":"","scores":[{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.8843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88442","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.8846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88477","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056474","reference_id":"2056474","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056474"},{"reference_url":"https://security.archlinux.org/AVG-2649","reference_id":"AVG-2649","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2649"},{"reference_url":"https://security.archlinux.org/AVG-2650","reference_id":"AVG-2650","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2650"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213091","reference_id":"HT213091","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://support.apple.com/en-us/HT213091"},{"reference_url":"https://support.apple.com/en-us/HT213092","reference_id":"HT213092","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://support.apple.com/en-us/HT213092"},{"reference_url":"https://support.apple.com/en-us/HT213093","reference_id":"HT213093","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://support.apple.com/en-us/HT213093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-22620"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48jv-7tnc-8fb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59533?format=json","vulnerability_id":"VCID-4a1y-uhze-syfg","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45482","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08095","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08078","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040329","reference_id":"2040329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040329"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-45482"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4a1y-uhze-syfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59505?format=json","vulnerability_id":"VCID-4dcz-sdeb-p7ar","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30795","reference_id":"","reference_type":"","scores":[{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75906","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75888","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.7587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75883","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986900","reference_id":"1986900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986900"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30795"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dcz-sdeb-p7ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59494?format=json","vulnerability_id":"VCID-4fv8-5wm3-byf9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30665","reference_id":"","reference_type":"","scores":[{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69627","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69698","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986874","reference_id":"1986874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986874"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212335","reference_id":"HT212335","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212335"},{"reference_url":"https://support.apple.com/en-us/HT212336","reference_id":"HT212336","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212336"},{"reference_url":"https://support.apple.com/en-us/HT212339","reference_id":"HT212339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212339"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://support.apple.com/en-us/HT212532","reference_id":"HT212532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30665"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fv8-5wm3-byf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47884?format=json","vulnerability_id":"VCID-4kzn-hfnz-3faf","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40451","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50647","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40451"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/2","reference_id":"2","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241409","reference_id":"2241409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241409"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/3","reference_id":"3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/3"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-40451"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzn-hfnz-3faf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59518?format=json","vulnerability_id":"VCID-4mbv-yf9n-puck","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30887","reference_id":"","reference_type":"","scores":[{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53665","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034381","reference_id":"2034381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034381"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5213-1/","reference_id":"USN-5213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5213-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30887"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mbv-yf9n-puck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49527?format=json","vulnerability_id":"VCID-4tnr-2yst-m3b8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46699","reference_id":"","reference_type":"","scores":[{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71746","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71765","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156993","reference_id":"2156993","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156993"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5797-1/","reference_id":"USN-5797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5797-1/"}],"fixed_packages":[],"aliases":["CVE-2022-46699"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4tnr-2yst-m3b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79746?format=json","vulnerability_id":"VCID-4vn7-zfkq-a7dm","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22594","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44168","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44187","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44154","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045291","reference_id":"2045291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-22594"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4vn7-zfkq-a7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33711?format=json","vulnerability_id":"VCID-5334-8qf3-tqbp","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32373","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13004","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12931","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12982","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12906","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209214","reference_id":"2209214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209214"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213757","reference_id":"HT213757","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213757"},{"reference_url":"https://support.apple.com/en-us/HT213758","reference_id":"HT213758","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213758"},{"reference_url":"https://support.apple.com/en-us/HT213761","reference_id":"HT213761","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213761"},{"reference_url":"https://support.apple.com/en-us/HT213762","reference_id":"HT213762","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213762"},{"reference_url":"https://support.apple.com/en-us/HT213764","reference_id":"HT213764","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213764"},{"reference_url":"https://support.apple.com/en-us/HT213765","reference_id":"HT213765","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3432","reference_id":"RHSA-2023:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3433","reference_id":"RHSA-2023:3433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[],"aliases":["CVE-2023-32373"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5334-8qf3-tqbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41966?format=json","vulnerability_id":"VCID-53ct-99rf-sydt","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42843","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26538","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27689","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32648","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271717","reference_id":"2271717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271717"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT213981","reference_id":"HT213981","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213981"},{"reference_url":"https://support.apple.com/en-us/HT213982","reference_id":"HT213982","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213982"},{"reference_url":"https://support.apple.com/en-us/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213984"},{"reference_url":"https://support.apple.com/en-us/HT213986","reference_id":"HT213986","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213986"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2023-42843"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-53ct-99rf-sydt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48049?format=json","vulnerability_id":"VCID-55jm-2a6c-8fah","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13584.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13584","reference_id":"","reference_type":"","scores":[{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78551","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78627","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78557","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.7857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01162","scoring_system":"epss","scoring_elements":"0.78603","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901212","reference_id":"1901212","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901212"},{"reference_url":"https://security.archlinux.org/ASA-202011-28","reference_id":"ASA-202011-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-28"},{"reference_url":"https://security.archlinux.org/AVG-1291","reference_id":"AVG-1291","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1291"},{"reference_url":"https://security.gentoo.org/glsa/202012-10","reference_id":"GLSA-202012-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2020-13584"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55jm-2a6c-8fah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79537?format=json","vulnerability_id":"VCID-5828-4rwa-tkcg","summary":"webkitgtk: logic issue was addressed with improved state management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22637","reference_id":"","reference_type":"","scores":[{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46962","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.4696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46955","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073903","reference_id":"2073903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073903"},{"reference_url":"https://security.archlinux.org/AVG-2703","reference_id":"AVG-2703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2703"},{"reference_url":"https://support.apple.com/en-us/HT213182","reference_id":"HT213182","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/"}],"url":"https://support.apple.com/en-us/HT213182"},{"reference_url":"https://support.apple.com/en-us/HT213186","reference_id":"HT213186","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/"}],"url":"https://support.apple.com/en-us/HT213186"},{"reference_url":"https://support.apple.com/en-us/HT213187","reference_id":"HT213187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/"}],"url":"https://support.apple.com/en-us/HT213187"},{"reference_url":"https://support.apple.com/en-us/HT213193","reference_id":"HT213193","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/"}],"url":"https://support.apple.com/en-us/HT213193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5394-1/","reference_id":"USN-5394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5394-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22637"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5828-4rwa-tkcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49531?format=json","vulnerability_id":"VCID-586h-px4g-77ab","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23529.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23529","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26122","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26015","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2169934","reference_id":"2169934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2169934"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213633","reference_id":"HT213633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/"}],"url":"https://support.apple.com/en-us/HT213633"},{"reference_url":"https://support.apple.com/en-us/HT213635","reference_id":"HT213635","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/"}],"url":"https://support.apple.com/en-us/HT213635"},{"reference_url":"https://support.apple.com/en-us/HT213638","reference_id":"HT213638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/"}],"url":"https://support.apple.com/en-us/HT213638"},{"reference_url":"https://support.apple.com/en-us/HT213673","reference_id":"HT213673","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/"}],"url":"https://support.apple.com/en-us/HT213673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0902","reference_id":"RHSA-2023:0902","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0902"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0903","reference_id":"RHSA-2023:0903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5893-1/","reference_id":"USN-5893-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5893-1/"}],"fixed_packages":[],"aliases":["CVE-2023-23529"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-586h-px4g-77ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59515?format=json","vulnerability_id":"VCID-5cwk-td7w-3uem","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30851","reference_id":"","reference_type":"","scores":[{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.7739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77343","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77354","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2018573","reference_id":"2018573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2018573"},{"reference_url":"https://security.archlinux.org/ASA-202110-10","reference_id":"ASA-202110-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-10"},{"reference_url":"https://security.archlinux.org/ASA-202110-9","reference_id":"ASA-202110-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-9"},{"reference_url":"https://security.archlinux.org/AVG-2483","reference_id":"AVG-2483","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2483"},{"reference_url":"https://security.archlinux.org/AVG-2484","reference_id":"AVG-2484","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2484"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5127-1/","reference_id":"USN-5127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5127-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30851"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwk-td7w-3uem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71951?format=json","vulnerability_id":"VCID-5x1k-uam9-5bhs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24162","reference_id":"","reference_type":"","scores":[{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.7871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78749","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344624","reference_id":"2344624","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1957","reference_id":"RHSA-2025:1957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1958","reference_id":"RHSA-2025:1958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1959","reference_id":"RHSA-2025:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1960","reference_id":"RHSA-2025:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2035","reference_id":"RHSA-2025:2035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2121","reference_id":"RHSA-2025:2121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2126","reference_id":"RHSA-2025:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2126"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24162"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5x1k-uam9-5bhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48050?format=json","vulnerability_id":"VCID-65np-zp25-2yez","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9948.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9948.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9948","reference_id":"","reference_type":"","scores":[{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52648","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52684","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52729","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901214","reference_id":"1901214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901214"},{"reference_url":"https://security.archlinux.org/AVG-1293","reference_id":"AVG-1293","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1293"},{"reference_url":"https://security.gentoo.org/glsa/202012-10","reference_id":"GLSA-202012-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4648-1/","reference_id":"USN-4648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4648-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9948"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-65np-zp25-2yez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60128?format=json","vulnerability_id":"VCID-67jq-85hp-hkez","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9807.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9807","reference_id":"","reference_type":"","scores":[{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45727","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45708","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879564","reference_id":"1879564","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879564"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9807"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67jq-85hp-hkez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59507?format=json","vulnerability_id":"VCID-67td-2hu4-eqdp","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30799","reference_id":"","reference_type":"","scores":[{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77064","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986906","reference_id":"1986906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986906"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30799"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67td-2hu4-eqdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49523?format=json","vulnerability_id":"VCID-68gk-5ng7-17d9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42867","reference_id":"","reference_type":"","scores":[{"value":"0.05716","scoring_system":"epss","scoring_elements":"0.90392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05716","scoring_system":"epss","scoring_elements":"0.90436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05716","scoring_system":"epss","scoring_elements":"0.90404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05716","scoring_system":"epss","scoring_elements":"0.90408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05716","scoring_system":"epss","scoring_elements":"0.90422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05716","scoring_system":"epss","scoring_elements":"0.90429","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/12/26/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/12/26/1"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156989","reference_id":"2156989","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156989"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5797-1/","reference_id":"USN-5797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5797-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42867"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68gk-5ng7-17d9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62522?format=json","vulnerability_id":"VCID-6dgz-w5ga-abb5","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22677.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22677","reference_id":"","reference_type":"","scores":[{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.3975","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42622","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104788","reference_id":"2104788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104788"},{"reference_url":"https://security.archlinux.org/AVG-2779","reference_id":"AVG-2779","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2779"},{"reference_url":"https://security.archlinux.org/AVG-2780","reference_id":"AVG-2780","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2780"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T19:09:48Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T19:09:48Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5522-1/","reference_id":"USN-5522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5522-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22677"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dgz-w5ga-abb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49530?format=json","vulnerability_id":"VCID-6t3m-f99z-1kf6","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23518","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54238","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54213","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54292","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167715","reference_id":"2167715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167715"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213599","reference_id":"HT213599","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213599"},{"reference_url":"https://support.apple.com/en-us/HT213600","reference_id":"HT213600","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213600"},{"reference_url":"https://support.apple.com/en-us/HT213601","reference_id":"HT213601","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213601"},{"reference_url":"https://support.apple.com/en-us/HT213603","reference_id":"HT213603","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213603"},{"reference_url":"https://support.apple.com/en-us/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213604"},{"reference_url":"https://support.apple.com/en-us/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213605"},{"reference_url":"https://support.apple.com/en-us/HT213606","reference_id":"HT213606","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213606"},{"reference_url":"https://support.apple.com/en-us/HT213638","reference_id":"HT213638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/"}],"url":"https://support.apple.com/en-us/HT213638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5867-1/","reference_id":"USN-5867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5867-1/"}],"fixed_packages":[],"aliases":["CVE-2023-23518"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t3m-f99z-1kf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62519?format=json","vulnerability_id":"VCID-6tnz-34ve-ckds","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22628.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22628","reference_id":"","reference_type":"","scores":[{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43602","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073896","reference_id":"2073896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073896"},{"reference_url":"https://security.archlinux.org/AVG-2703","reference_id":"AVG-2703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2703"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213182","reference_id":"HT213182","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213182"},{"reference_url":"https://support.apple.com/en-us/HT213186","reference_id":"HT213186","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213186"},{"reference_url":"https://support.apple.com/en-us/HT213187","reference_id":"HT213187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213187"},{"reference_url":"https://support.apple.com/en-us/HT213193","reference_id":"HT213193","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5394-1/","reference_id":"USN-5394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5394-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22628"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6tnz-34ve-ckds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33721?format=json","vulnerability_id":"VCID-6uck-ed5x-fyga","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38599","reference_id":"","reference_type":"","scores":[{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67737","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67671","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231020","reference_id":"2231020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231020"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38599"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6uck-ed5x-fyga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75753?format=json","vulnerability_id":"VCID-6xkn-7q6s-5fey","summary":"webkit: pointer authentication bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27834","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00773","published_at":"2026-04-13T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00772","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00701","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00778","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00784","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00788","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00697","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00702","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/21/1","reference_id":"1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/21/1"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/10","reference_id":"10","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/10"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/12","reference_id":"12","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/12"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/16","reference_id":"16","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/17","reference_id":"17","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/17"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282412","reference_id":"2282412","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282412"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/9","reference_id":"9","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/9"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/","reference_id":"ADCLQW54XN37VJZNYD3UKCYATJFIMYXG","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6788-1/","reference_id":"USN-6788-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6788-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/","reference_id":"WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/"}],"fixed_packages":[],"aliases":["CVE-2024-27834"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkn-7q6s-5fey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33715?format=json","vulnerability_id":"VCID-71d6-g16a-3qa9","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38133","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.6069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60675","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231015","reference_id":"2231015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231015"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38133"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71d6-g16a-3qa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59502?format=json","vulnerability_id":"VCID-7cef-namz-wkec","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30758","reference_id":"","reference_type":"","scores":[{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57115","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57164","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986892","reference_id":"1986892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986892"},{"reference_url":"https://security.archlinux.org/AVG-2218","reference_id":"AVG-2218","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2218"},{"reference_url":"https://security.archlinux.org/AVG-2219","reference_id":"AVG-2219","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2219"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30758"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cef-namz-wkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33726?format=json","vulnerability_id":"VCID-7ehr-3myw-g7b1","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42917","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20792","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20872","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/05/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/05/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253058","reference_id":"2253058","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253058"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/3"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/35","reference_id":"35","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/35"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/4","reference_id":"4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/4"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/5","reference_id":"5","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/5"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","reference_id":"AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5575","reference_id":"dsa-5575","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://www.debian.org/security/2023/dsa-5575"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT214031","reference_id":"HT214031","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214031"},{"reference_url":"https://support.apple.com/en-us/HT214032","reference_id":"HT214032","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214032"},{"reference_url":"https://support.apple.com/en-us/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214034"},{"reference_url":"https://support.apple.com/kb/HT214062","reference_id":"HT214062","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","reference_id":"P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7715","reference_id":"RHSA-2023:7715","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7715"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7716","reference_id":"RHSA-2023:7716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6545-1/","reference_id":"USN-6545-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6545-1/"}],"fixed_packages":[],"aliases":["CVE-2023-42917"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ehr-3myw-g7b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59490?format=json","vulnerability_id":"VCID-7gbc-786y-hyc8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21779","reference_id":"","reference_type":"","scores":[{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66233","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66306","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66337","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66317","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986866","reference_id":"1986866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986866"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-21779"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbc-786y-hyc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61841?format=json","vulnerability_id":"VCID-7gyr-mvmk-pfh9","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54467","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40547","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43221","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353872","reference_id":"2353872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353872"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[],"aliases":["CVE-2024-54467"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31101?format=json","vulnerability_id":"VCID-7hva-brss-wkhr","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9925.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9925","reference_id":"","reference_type":"","scores":[{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74178","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74252","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74227","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879541","reference_id":"1879541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879541"},{"reference_url":"https://security.gentoo.org/glsa/202007-61","reference_id":"GLSA-202007-61","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4444-1/","reference_id":"USN-4444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4444-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9925"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7hva-brss-wkhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41463?format=json","vulnerability_id":"VCID-7ua3-g2sz-ebej","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9947.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9947","reference_id":"","reference_type":"","scores":[{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74212","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944331","reference_id":"1944331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944331"},{"reference_url":"https://security.archlinux.org/AVG-1723","reference_id":"AVG-1723","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1723"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2020-9947"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ua3-g2sz-ebej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60126?format=json","vulnerability_id":"VCID-82hd-28j1-xyev","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9805.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9805","reference_id":"","reference_type":"","scores":[{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75081","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75136","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75124","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879559","reference_id":"1879559","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879559"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9805"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-82hd-28j1-xyev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59501?format=json","vulnerability_id":"VCID-835v-4yds-ebem","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30749","reference_id":"","reference_type":"","scores":[{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79386","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986890","reference_id":"1986890","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986890"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30749"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-835v-4yds-ebem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49537?format=json","vulnerability_id":"VCID-85na-58dz-53hb","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27932","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01761","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01755","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236843","reference_id":"2236843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236843"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://support.apple.com/en-us/HT213671","reference_id":"HT213671","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213671"},{"reference_url":"https://support.apple.com/en-us/HT213674","reference_id":"HT213674","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213674"},{"reference_url":"https://support.apple.com/en-us/HT213676","reference_id":"HT213676","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213676"},{"reference_url":"https://support.apple.com/en-us/HT213678","reference_id":"HT213678","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2023-27932"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-85na-58dz-53hb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31100?format=json","vulnerability_id":"VCID-86rq-d7wp-yyfw","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9915.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9915.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9915","reference_id":"","reference_type":"","scores":[{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73551","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.7356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73627","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.73609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00775","scoring_system":"epss","scoring_elements":"0.736","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879540","reference_id":"1879540","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879540"},{"reference_url":"https://security.gentoo.org/glsa/202007-61","reference_id":"GLSA-202007-61","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4444-1/","reference_id":"USN-4444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4444-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9915"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-86rq-d7wp-yyfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59485?format=json","vulnerability_id":"VCID-8dkk-sgdg-kfhy","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1825.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1825","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.62951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63051","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63009","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63054","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63069","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986858","reference_id":"1986858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986858"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-1825"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8dkk-sgdg-kfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62529?format=json","vulnerability_id":"VCID-8kh9-phq4-13a3","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30293.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30293","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4038","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082548","reference_id":"2082548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082548"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-30293"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8kh9-phq4-13a3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41969?format=json","vulnerability_id":"VCID-8ncw-zt4k-73ak","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42956","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53544","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271719","reference_id":"2271719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271719"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2023-42956"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ncw-zt4k-73ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62523?format=json","vulnerability_id":"VCID-8trg-392k-3bdh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26700.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26700","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33132","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092732","reference_id":"2092732","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092732"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[],"aliases":["CVE-2022-26700"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8trg-392k-3bdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41978?format=json","vulnerability_id":"VCID-8utu-penp-rbax","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23280","reference_id":"","reference_type":"","scores":[{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66605","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270291","reference_id":"2270291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270291"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","reference_id":"AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","reference_id":"BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","reference_id":"PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2024-23280"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8utu-penp-rbax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59498?format=json","vulnerability_id":"VCID-8y8h-r2c8-hudj","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30720","reference_id":"","reference_type":"","scores":[{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59623","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59639","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986883","reference_id":"1986883","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986883"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30720"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8y8h-r2c8-hudj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66440?format=json","vulnerability_id":"VCID-933e-5azn-6yec","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43000","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18673","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26483","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120324","reference_id":"120324","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120324"},{"reference_url":"https://support.apple.com/en-us/120331","reference_id":"120331","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120331"},{"reference_url":"https://support.apple.com/en-us/120338","reference_id":"120338","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120338"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416324","reference_id":"2416324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-43000"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-933e-5azn-6yec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41460?format=json","vulnerability_id":"VCID-96uu-rhdj-ebbq","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27918.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27918.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27918","reference_id":"","reference_type":"","scores":[{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.4625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46273","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46248","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944323","reference_id":"1944323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944323"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2020-27918"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-96uu-rhdj-ebbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66452?format=json","vulnerability_id":"VCID-9dnz-1f32-gfdp","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43480","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08458","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416338","reference_id":"2416338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2025-43480"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dnz-1f32-gfdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72614?format=json","vulnerability_id":"VCID-9j6k-np3x-23f7","summary":"webkit: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54508","reference_id":"","reference_type":"","scores":[{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80304","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80656","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333845","reference_id":"2333845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[],"aliases":["CVE-2024-54508"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59513?format=json","vulnerability_id":"VCID-9jak-ycxb-bfgx","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30848","reference_id":"","reference_type":"","scores":[{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54628","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54698","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54691","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54743","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017901","reference_id":"2017901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017901"},{"reference_url":"https://security.archlinux.org/AVG-2399","reference_id":"AVG-2399","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2399"},{"reference_url":"https://security.archlinux.org/AVG-2400","reference_id":"AVG-2400","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2400"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30848"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jak-ycxb-bfgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31098?format=json","vulnerability_id":"VCID-9ngd-m4ac-mba1","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9894.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9894.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9894","reference_id":"","reference_type":"","scores":[{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71054","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71088","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71093","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879536","reference_id":"1879536","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879536"},{"reference_url":"https://security.gentoo.org/glsa/202007-61","reference_id":"GLSA-202007-61","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4444-1/","reference_id":"USN-4444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4444-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9894"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ngd-m4ac-mba1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33710?format=json","vulnerability_id":"VCID-a35x-vamv-zyez","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32370","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/11/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/11/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238944","reference_id":"2238944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238944"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-32370"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a35x-vamv-zyez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59491?format=json","vulnerability_id":"VCID-afqa-zafe-cqhn","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21806","reference_id":"","reference_type":"","scores":[{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83883","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83962","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83956","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.8394","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980441","reference_id":"1980441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980441"},{"reference_url":"https://security.archlinux.org/AVG-2214","reference_id":"AVG-2214","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2214"},{"reference_url":"https://security.archlinux.org/AVG-2215","reference_id":"AVG-2215","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2215"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-21806"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-afqa-zafe-cqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62520?format=json","vulnerability_id":"VCID-apee-zyq1-9fdz","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22629.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22629","reference_id":"","reference_type":"","scores":[{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95743","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95742","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073899","reference_id":"2073899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073899"},{"reference_url":"https://security.archlinux.org/AVG-2703","reference_id":"AVG-2703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2703"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213182","reference_id":"HT213182","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213182"},{"reference_url":"https://support.apple.com/en-us/HT213186","reference_id":"HT213186","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213186"},{"reference_url":"https://support.apple.com/en-us/HT213187","reference_id":"HT213187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213187"},{"reference_url":"https://support.apple.com/en-us/HT213188","reference_id":"HT213188","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213188"},{"reference_url":"https://support.apple.com/en-us/HT213193","reference_id":"HT213193","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5394-1/","reference_id":"USN-5394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5394-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22629"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apee-zyq1-9fdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61843?format=json","vulnerability_id":"VCID-azef-hxum-z3eb","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24201","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27125","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122281","reference_id":"122281","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122281"},{"reference_url":"https://support.apple.com/en-us/122283","reference_id":"122283","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122283"},{"reference_url":"https://support.apple.com/en-us/122284","reference_id":"122284","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122284"},{"reference_url":"https://support.apple.com/en-us/122285","reference_id":"122285","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122285"},{"reference_url":"https://support.apple.com/en-us/122345","reference_id":"122345","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122345"},{"reference_url":"https://support.apple.com/en-us/122346","reference_id":"122346","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122346"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122376","reference_id":"122376","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122376"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351802","reference_id":"2351802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351802"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2863","reference_id":"RHSA-2025:2863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2864","reference_id":"RHSA-2025:2864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2997","reference_id":"RHSA-2025:2997","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2997"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2998","reference_id":"RHSA-2025:2998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3000","reference_id":"RHSA-2025:3000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3001","reference_id":"RHSA-2025:3001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3002","reference_id":"RHSA-2025:3002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3005","reference_id":"RHSA-2025:3005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3034","reference_id":"RHSA-2025:3034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3034"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24201"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72611?format=json","vulnerability_id":"VCID-b3dw-sj5b-5bhr","summary":"webkit: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54502","reference_id":"","reference_type":"","scores":[{"value":"0.05739","scoring_system":"epss","scoring_elements":"0.9041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.9167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91667","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333843","reference_id":"2333843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[],"aliases":["CVE-2024-54502"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59523?format=json","vulnerability_id":"VCID-b3jh-p9hd-ebb7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30934","reference_id":"","reference_type":"","scores":[{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82155","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82189","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82225","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044521","reference_id":"2044521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044521"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30934"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3jh-p9hd-ebb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79867?format=json","vulnerability_id":"VCID-b6zs-hjbz-mugn","summary":"webkitgtk: use-after-free in WebCore::Frame::page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45483.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45483","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1353","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13508","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040331","reference_id":"2040331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-45483"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b6zs-hjbz-mugn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62525?format=json","vulnerability_id":"VCID-b83q-gs49-1yar","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26710.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26710","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46979","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46952","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104789","reference_id":"2104789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104789"},{"reference_url":"https://security.archlinux.org/AVG-2779","reference_id":"AVG-2779","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2779"},{"reference_url":"https://security.archlinux.org/AVG-2780","reference_id":"AVG-2780","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2780"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5522-1/","reference_id":"USN-5522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5522-1/"}],"fixed_packages":[],"aliases":["CVE-2022-26710"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b83q-gs49-1yar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71949?format=json","vulnerability_id":"VCID-b8ws-1k92-7bhq","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54543","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344619","reference_id":"2344619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1957","reference_id":"RHSA-2025:1957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1958","reference_id":"RHSA-2025:1958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1959","reference_id":"RHSA-2025:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1960","reference_id":"RHSA-2025:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2035","reference_id":"RHSA-2025:2035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2121","reference_id":"RHSA-2025:2121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2126","reference_id":"RHSA-2025:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2126"}],"fixed_packages":[],"aliases":["CVE-2024-54543"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59508?format=json","vulnerability_id":"VCID-b9t6-k4u8-qqbt","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30809","reference_id":"","reference_type":"","scores":[{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59731","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59829","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59851","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034347","reference_id":"2034347","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034347"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30809"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b9t6-k4u8-qqbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62527?format=json","vulnerability_id":"VCID-bk7s-xwkc-67c4","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26717.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26717","reference_id":"","reference_type":"","scores":[{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73487","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76684","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092735","reference_id":"2092735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092735"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213259","reference_id":"HT213259","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213259"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[],"aliases":["CVE-2022-26717"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bk7s-xwkc-67c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61847?format=json","vulnerability_id":"VCID-bkcz-d48v-7uca","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24213","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31916","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357913","reference_id":"2357913","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357913"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59522?format=json","vulnerability_id":"VCID-bm12-ezac-rye8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30897","reference_id":"","reference_type":"","scores":[{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54287","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54368","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2038907","reference_id":"2038907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2038907"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30897"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bm12-ezac-rye8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49529?format=json","vulnerability_id":"VCID-bmta-jy4b-mugh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23517","reference_id":"","reference_type":"","scores":[{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43763","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43804","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167717","reference_id":"2167717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167717"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213599","reference_id":"HT213599","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213599"},{"reference_url":"https://support.apple.com/en-us/HT213600","reference_id":"HT213600","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213600"},{"reference_url":"https://support.apple.com/en-us/HT213601","reference_id":"HT213601","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213601"},{"reference_url":"https://support.apple.com/en-us/HT213603","reference_id":"HT213603","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213603"},{"reference_url":"https://support.apple.com/en-us/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213604"},{"reference_url":"https://support.apple.com/en-us/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213605"},{"reference_url":"https://support.apple.com/en-us/HT213606","reference_id":"HT213606","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213606"},{"reference_url":"https://support.apple.com/en-us/HT213638","reference_id":"HT213638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/"}],"url":"https://support.apple.com/en-us/HT213638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5867-1/","reference_id":"USN-5867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5867-1/"}],"fixed_packages":[],"aliases":["CVE-2023-23517"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bmta-jy4b-mugh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47885?format=json","vulnerability_id":"VCID-br5g-pfa4-33h7","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41074","reference_id":"","reference_type":"","scores":[{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78245","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241412","reference_id":"2241412","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241412"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6426-1/","reference_id":"USN-6426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6426-1/"}],"fixed_packages":[],"aliases":["CVE-2023-41074"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-br5g-pfa4-33h7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49539?format=json","vulnerability_id":"VCID-btcm-r2s6-vubj","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28205.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28205","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21077","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21099","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2621","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29806","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185724","reference_id":"2185724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185724"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213720","reference_id":"HT213720","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/"}],"url":"https://support.apple.com/en-us/HT213720"},{"reference_url":"https://support.apple.com/en-us/HT213721","reference_id":"HT213721","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/"}],"url":"https://support.apple.com/en-us/HT213721"},{"reference_url":"https://support.apple.com/en-us/HT213722","reference_id":"HT213722","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/"}],"url":"https://support.apple.com/en-us/HT213722"},{"reference_url":"https://support.apple.com/en-us/HT213723","reference_id":"HT213723","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/"}],"url":"https://support.apple.com/en-us/HT213723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1918","reference_id":"RHSA-2023:1918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1919","reference_id":"RHSA-2023:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2023-28205"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-btcm-r2s6-vubj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49512?format=json","vulnerability_id":"VCID-c4mn-f4k4-wqe9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32886","reference_id":"","reference_type":"","scores":[{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75308","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75307","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128643","reference_id":"2128643","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128643"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/39","reference_id":"39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/39"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/41","reference_id":"41","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/","reference_id":"74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/"},{"reference_url":"https://security.archlinux.org/AVG-2819","reference_id":"AVG-2819","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2819"},{"reference_url":"https://security.archlinux.org/AVG-2820","reference_id":"AVG-2820","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2820"},{"reference_url":"https://www.debian.org/security/2022/dsa-5240","reference_id":"dsa-5240","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://www.debian.org/security/2022/dsa-5240"},{"reference_url":"https://www.debian.org/security/2022/dsa-5241","reference_id":"dsa-5241","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://www.debian.org/security/2022/dsa-5241"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213442","reference_id":"HT213442","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://support.apple.com/en-us/HT213442"},{"reference_url":"https://support.apple.com/en-us/HT213445","reference_id":"HT213445","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://support.apple.com/en-us/HT213445"},{"reference_url":"https://support.apple.com/en-us/HT213446","reference_id":"HT213446","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://support.apple.com/en-us/HT213446"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/","reference_id":"KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/","reference_id":"TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/"},{"reference_url":"https://usn.ubuntu.com/5642-1/","reference_id":"USN-5642-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5642-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32886"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4mn-f4k4-wqe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69654?format=json","vulnerability_id":"VCID-c4np-b4zq-tkch","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71245","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500","reference_id":"2366500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69657?format=json","vulnerability_id":"VCID-c9mb-24v2-q3ba","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215","reference_id":"","reference_type":"","scores":[{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78256","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503","reference_id":"2366503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31215"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49532?format=json","vulnerability_id":"VCID-cc7v-7r6y-nkcp","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25358","reference_id":"","reference_type":"","scores":[{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36955","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37016","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36981","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175099","reference_id":"2175099","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2175099"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/04/21/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/04/21/3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/","reference_id":"5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/","reference_id":"6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/","reference_id":"KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=242683","reference_id":"show_bug.cgi?id=242683","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/"}],"url":"https://bugs.webkit.org/show_bug.cgi?id=242683"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2023-25358"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cc7v-7r6y-nkcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72076?format=json","vulnerability_id":"VCID-ceyb-j3sq-27fh","summary":"webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27856","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07103","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344618","reference_id":"2344618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27856"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyb-j3sq-27fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49528?format=json","vulnerability_id":"VCID-cjg6-jkzc-uyg8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46700","reference_id":"","reference_type":"","scores":[{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71746","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71765","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/21","reference_id":"21","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156994","reference_id":"2156994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156994"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213531","reference_id":"HT213531","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"https://support.apple.com/en-us/HT213531"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5797-1/","reference_id":"USN-5797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5797-1/"}],"fixed_packages":[],"aliases":["CVE-2022-46700"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjg6-jkzc-uyg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59519?format=json","vulnerability_id":"VCID-cjn2-p55e-bbbs","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30888","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4413","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034383","reference_id":"2034383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034383"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30888"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjn2-p55e-bbbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48052?format=json","vulnerability_id":"VCID-ckrd-x24d-cyav","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9952.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9952","reference_id":"","reference_type":"","scores":[{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66163","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66281","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66248","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00506","scoring_system":"epss","scoring_elements":"0.66261","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901219","reference_id":"1901219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901219"},{"reference_url":"https://security.archlinux.org/AVG-1292","reference_id":"AVG-1292","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1292"},{"reference_url":"https://security.gentoo.org/glsa/202012-10","reference_id":"GLSA-202012-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4648-1/","reference_id":"USN-4648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4648-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9952"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ckrd-x24d-cyav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61842?format=json","vulnerability_id":"VCID-cmdy-ztbw-jffq","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54551","reference_id":"","reference_type":"","scores":[{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.6615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.6618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66186","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357909","reference_id":"2357909","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357909"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2024-54551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59492?format=json","vulnerability_id":"VCID-cuwm-antx-6ye4","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30661.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30661","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35073","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35101","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35022","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986870","reference_id":"1986870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986870"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212317","reference_id":"HT212317","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212317"},{"reference_url":"https://support.apple.com/en-us/HT212318","reference_id":"HT212318","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212318"},{"reference_url":"https://support.apple.com/en-us/HT212323","reference_id":"HT212323","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212323"},{"reference_url":"https://support.apple.com/en-us/HT212324","reference_id":"HT212324","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212324"},{"reference_url":"https://support.apple.com/en-us/HT212325","reference_id":"HT212325","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212325"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30661"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cuwm-antx-6ye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61849?format=json","vulnerability_id":"VCID-cw56-pdyr-fbge","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24216","reference_id":"","reference_type":"","scores":[{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.7439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74397","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74413","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357917","reference_id":"2357917","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357917"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47886?format=json","vulnerability_id":"VCID-dafx-64dz-ubfw","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41983","reference_id":"","reference_type":"","scores":[{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78065","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78095","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78077","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78111","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271453","reference_id":"2271453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271453"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6490-1/","reference_id":"USN-6490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6490-1/"}],"fixed_packages":[],"aliases":["CVE-2023-41983"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dafx-64dz-ubfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72793?format=json","vulnerability_id":"VCID-dd4q-8fs5-3kej","summary":"webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44308","reference_id":"","reference_type":"","scores":[{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81399","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81406","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121752","reference_id":"121752","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121752"},{"reference_url":"https://support.apple.com/en-us/121753","reference_id":"121753","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121753"},{"reference_url":"https://support.apple.com/en-us/121754","reference_id":"121754","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121754"},{"reference_url":"https://support.apple.com/en-us/121755","reference_id":"121755","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121755"},{"reference_url":"https://support.apple.com/en-us/121756","reference_id":"121756","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121756"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327931","reference_id":"2327931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7142-1/","reference_id":"USN-7142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7142-1/"}],"fixed_packages":[],"aliases":["CVE-2024-44308"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dd4q-8fs5-3kej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69652?format=json","vulnerability_id":"VCID-drtd-1c4r-1bbf","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42970","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64414","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64481","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120330","reference_id":"120330","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120330"},{"reference_url":"https://support.apple.com/en-us/120947","reference_id":"120947","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120947"},{"reference_url":"https://support.apple.com/en-us/120948","reference_id":"120948","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120948"},{"reference_url":"https://support.apple.com/en-us/120949","reference_id":"120949","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120949"},{"reference_url":"https://support.apple.com/en-us/120950","reference_id":"120950","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366498","reference_id":"2366498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366498"},{"reference_url":"https://security.archlinux.org/ASA-202505-2","reference_id":"ASA-202505-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-2"},{"reference_url":"https://security.archlinux.org/ASA-202505-3","reference_id":"ASA-202505-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-3"},{"reference_url":"https://security.archlinux.org/ASA-202505-4","reference_id":"ASA-202505-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-4"},{"reference_url":"https://security.archlinux.org/ASA-202505-5","reference_id":"ASA-202505-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-5"},{"reference_url":"https://security.archlinux.org/AVG-2867","reference_id":"AVG-2867","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2867"},{"reference_url":"https://security.archlinux.org/AVG-2868","reference_id":"AVG-2868","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2868"},{"reference_url":"https://security.archlinux.org/AVG-2869","reference_id":"AVG-2869","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2869"},{"reference_url":"https://security.archlinux.org/AVG-2870","reference_id":"AVG-2870","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-42970"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drtd-1c4r-1bbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49518?format=json","vulnerability_id":"VCID-dsb1-yxm6-dkcf","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42824","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08383","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08366","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09617","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140504","reference_id":"2140504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140504"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/04/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/04/4"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","reference_id":"5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","reference_id":"AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5273","reference_id":"dsa-5273","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://www.debian.org/security/2022/dsa-5273"},{"reference_url":"https://www.debian.org/security/2022/dsa-5274","reference_id":"dsa-5274","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://www.debian.org/security/2022/dsa-5274"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://support.apple.com/en-us/HT213488"},{"reference_url":"https://support.apple.com/en-us/HT213489","reference_id":"HT213489","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://support.apple.com/en-us/HT213489"},{"reference_url":"https://support.apple.com/en-us/HT213491","reference_id":"HT213491","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://support.apple.com/en-us/HT213491"},{"reference_url":"https://support.apple.com/en-us/HT213492","reference_id":"HT213492","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://support.apple.com/en-us/HT213492"},{"reference_url":"https://support.apple.com/en-us/HT213495","reference_id":"HT213495","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://support.apple.com/en-us/HT213495"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","reference_id":"JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5730-1/","reference_id":"USN-5730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5730-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42824"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dsb1-yxm6-dkcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73822?format=json","vulnerability_id":"VCID-dxsm-nf4f-yfe4","summary":"webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27833","reference_id":"","reference_type":"","scores":[{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79105","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81967","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314700","reference_id":"2314700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314700"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27833"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59530?format=json","vulnerability_id":"VCID-dz61-8f33-t7ej","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30984","reference_id":"","reference_type":"","scores":[{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71725","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044553","reference_id":"2044553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044553"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30984"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dz61-8f33-t7ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41464?format=json","vulnerability_id":"VCID-e1rg-8a3d-z7a5","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1765.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1765.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1765","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24197","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24208","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944333","reference_id":"1944333","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944333"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1765"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1rg-8a3d-z7a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33725?format=json","vulnerability_id":"VCID-e5f7-5sx3-27b1","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42916","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14646","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14738","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14641","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1454","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/05/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/05/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253054","reference_id":"2253054","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253054"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/3","reference_id":"3","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/3"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/35","reference_id":"35","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/35"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/4","reference_id":"4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/4"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/5","reference_id":"5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/5"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/8","reference_id":"8","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","reference_id":"AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5575","reference_id":"dsa-5575","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://www.debian.org/security/2023/dsa-5575"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT214031","reference_id":"HT214031","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/en-us/HT214031"},{"reference_url":"https://support.apple.com/en-us/HT214032","reference_id":"HT214032","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/en-us/HT214032"},{"reference_url":"https://support.apple.com/en-us/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/en-us/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/kb/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/kb/HT214034"},{"reference_url":"https://support.apple.com/kb/HT214062","reference_id":"HT214062","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/kb/HT214062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","reference_id":"P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6545-1/","reference_id":"USN-6545-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6545-1/"}],"fixed_packages":[],"aliases":["CVE-2023-42916"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e5f7-5sx3-27b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49524?format=json","vulnerability_id":"VCID-e695-3zce-rfay","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46691","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61159","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61205","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61223","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/21","reference_id":"21","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156990","reference_id":"2156990","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156990"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213531","reference_id":"HT213531","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"https://support.apple.com/en-us/HT213531"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-46691"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e695-3zce-rfay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49515?format=json","vulnerability_id":"VCID-ex1v-8bhw-5yfm","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32923","reference_id":"","reference_type":"","scores":[{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46563","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46544","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46567","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50245","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140502","reference_id":"2140502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140502"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/04/4","reference_id":"4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/04/4"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"https://support.apple.com/en-us/HT213488"},{"reference_url":"https://support.apple.com/en-us/HT213489","reference_id":"HT213489","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"https://support.apple.com/en-us/HT213489"},{"reference_url":"https://support.apple.com/en-us/HT213490","reference_id":"HT213490","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"https://support.apple.com/en-us/HT213490"},{"reference_url":"https://support.apple.com/en-us/HT213491","reference_id":"HT213491","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"https://support.apple.com/en-us/HT213491"},{"reference_url":"https://support.apple.com/en-us/HT213492","reference_id":"HT213492","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"https://support.apple.com/en-us/HT213492"},{"reference_url":"https://support.apple.com/en-us/HT213495","reference_id":"HT213495","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/"}],"url":"https://support.apple.com/en-us/HT213495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5730-1/","reference_id":"USN-5730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5730-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32923"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1v-8bhw-5yfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69656?format=json","vulnerability_id":"VCID-ey9n-zksh-mbfm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206","reference_id":"","reference_type":"","scores":[{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78155","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502","reference_id":"2366502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62530?format=json","vulnerability_id":"VCID-eydj-6sth-akgw","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30294.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30294.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082544","reference_id":"2082544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082544"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-30294"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eydj-6sth-akgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77960?format=json","vulnerability_id":"VCID-f4xf-wrqj-mqbj","summary":"webkitgtk: A website may able to track visited websites in private browsing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32933","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43384","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43375","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271441","reference_id":"2271441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-32933"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f4xf-wrqj-mqbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47880?format=json","vulnerability_id":"VCID-f8z1-mtxh-1bhz","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32359","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271449","reference_id":"2271449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271449"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-32359"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f8z1-mtxh-1bhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59506?format=json","vulnerability_id":"VCID-feqc-qs1m-ube7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30797","reference_id":"","reference_type":"","scores":[{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71374","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986902","reference_id":"1986902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986902"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30797"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-feqc-qs1m-ube7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49520?format=json","vulnerability_id":"VCID-fknw-h7xk-gkbt","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42852","reference_id":"","reference_type":"","scores":[{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.7478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74821","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74781","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74852","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74831","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156986","reference_id":"2156986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156986"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/27","reference_id":"27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213531","reference_id":"HT213531","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"https://support.apple.com/en-us/HT213531"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5797-1/","reference_id":"USN-5797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5797-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42852"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fknw-h7xk-gkbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62521?format=json","vulnerability_id":"VCID-fpag-gk3v-bfhq","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22662.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22662","reference_id":"","reference_type":"","scores":[{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44955","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104787","reference_id":"2104787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104787"},{"reference_url":"https://security.archlinux.org/AVG-2779","reference_id":"AVG-2779","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2779"},{"reference_url":"https://security.archlinux.org/AVG-2780","reference_id":"AVG-2780","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2780"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-22662"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpag-gk3v-bfhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69658?format=json","vulnerability_id":"VCID-fzqz-yfn1-7yfd","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257","reference_id":"","reference_type":"","scores":[{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74034","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74037","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504","reference_id":"2366504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31257"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71911?format=json","vulnerability_id":"VCID-g2uh-tzx9-bqc7","summary":"webkitgtk: Processing web content may lead to a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54658","reference_id":"","reference_type":"","scores":[{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.4428","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44313","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344946","reference_id":"2344946","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-54658"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g2uh-tzx9-bqc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33712?format=json","vulnerability_id":"VCID-g4ct-k4dv-s7fs","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32393","reference_id":"","reference_type":"","scores":[{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.4681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46829","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46827","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46834","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224608","reference_id":"2224608","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224608"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[],"aliases":["CVE-2023-32393"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g4ct-k4dv-s7fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62526?format=json","vulnerability_id":"VCID-gaxq-59p5-fufx","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26716.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26716","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39149","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39111","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092734","reference_id":"2092734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092734"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[],"aliases":["CVE-2022-26716"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gaxq-59p5-fufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59532?format=json","vulnerability_id":"VCID-gf1x-4snz-fbfv","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42762.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-42762","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00837","published_at":"2026-04-01T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00834","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00849","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00839","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00833","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00843","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00844","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00847","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00851","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016673","reference_id":"2016673","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016673"},{"reference_url":"https://security.archlinux.org/ASA-202110-10","reference_id":"ASA-202110-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-10"},{"reference_url":"https://security.archlinux.org/ASA-202110-9","reference_id":"ASA-202110-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-9"},{"reference_url":"https://security.archlinux.org/AVG-2483","reference_id":"AVG-2483","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2483"},{"reference_url":"https://security.archlinux.org/AVG-2484","reference_id":"AVG-2484","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2484"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5127-1/","reference_id":"USN-5127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5127-1/"}],"fixed_packages":[],"aliases":["CVE-2021-42762"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gf1x-4snz-fbfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73823?format=json","vulnerability_id":"VCID-gjvy-329h-dkgp","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27838","reference_id":"","reference_type":"","scores":[{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80031","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27838"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314702","reference_id":"2314702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314702"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27838"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gjvy-329h-dkgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64203?format=json","vulnerability_id":"VCID-gn1n-fjzp-hqe2","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43010","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1427","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15601","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120300","reference_id":"120300","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120300"},{"reference_url":"https://support.apple.com/en-us/120877","reference_id":"120877","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120877"},{"reference_url":"https://support.apple.com/en-us/120879","reference_id":"120879","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120879"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://support.apple.com/en-us/126646","reference_id":"126646","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/126646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448778","reference_id":"2448778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-43010"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gn1n-fjzp-hqe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41976?format=json","vulnerability_id":"VCID-h7uu-gj11-a3er","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23263","reference_id":"","reference_type":"","scores":[{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70044","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.7006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.7002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.69996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.69972","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70031","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120880","reference_id":"120880","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120880"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270290","reference_id":"2270290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270290"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/26","reference_id":"26","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","reference_id":"AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","reference_id":"BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214082","reference_id":"HT214082","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214082"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214087","reference_id":"HT214087","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214087"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","reference_id":"PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2024-23263"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h7uu-gj11-a3er"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41461?format=json","vulnerability_id":"VCID-hgwz-tyjg-r7h8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29623.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29623","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09416","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09458","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09397","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944329","reference_id":"1944329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944329"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2020-29623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgwz-tyjg-r7h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71948?format=json","vulnerability_id":"VCID-hp6k-spzk-vbaa","summary":"webkitgtk: Copying a URL from Web Inspector may lead to command injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24150","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53944","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54028","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344622","reference_id":"2344622","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24150"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hp6k-spzk-vbaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62514?format=json","vulnerability_id":"VCID-hshv-d587-73b9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22589","reference_id":"","reference_type":"","scores":[{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73803","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.7384","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053179","reference_id":"2053179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053179"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5306-1/","reference_id":"USN-5306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5306-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22589"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hshv-d587-73b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49525?format=json","vulnerability_id":"VCID-hye4-wr18-5fbh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46692","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02415","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02424","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02445","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/21","reference_id":"21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156991","reference_id":"2156991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156991"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213531","reference_id":"HT213531","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://support.apple.com/en-us/HT213531"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://support.apple.com/en-us/HT213538","reference_id":"HT213538","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/"}],"url":"https://support.apple.com/en-us/HT213538"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5797-1/","reference_id":"USN-5797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5797-1/"}],"fixed_packages":[],"aliases":["CVE-2022-46692"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hye4-wr18-5fbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41469?format=json","vulnerability_id":"VCID-j6q2-urw5-nffz","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1870.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1870","reference_id":"","reference_type":"","scores":[{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.785","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944350","reference_id":"1944350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944350"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://support.apple.com/en-us/HT212146","reference_id":"HT212146","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://support.apple.com/en-us/HT212146"},{"reference_url":"https://support.apple.com/en-us/HT212147","reference_id":"HT212147","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://support.apple.com/en-us/HT212147"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/","reference_id":"JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","reference_id":"L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1870"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6q2-urw5-nffz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59521?format=json","vulnerability_id":"VCID-j8rg-9sya-8qbm","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30890","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41114","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41066","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034389","reference_id":"2034389","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034389"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5213-1/","reference_id":"USN-5213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5213-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30890"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8rg-9sya-8qbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59514?format=json","vulnerability_id":"VCID-javw-gqjb-mfdt","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30849","reference_id":"","reference_type":"","scores":[{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.4898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49051","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.48997","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017904","reference_id":"2017904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017904"},{"reference_url":"https://security.archlinux.org/AVG-2399","reference_id":"AVG-2399","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2399"},{"reference_url":"https://security.archlinux.org/AVG-2400","reference_id":"AVG-2400","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2400"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30849"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-javw-gqjb-mfdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48053?format=json","vulnerability_id":"VCID-jdy8-m8nb-pbhu","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9983.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9983","reference_id":"","reference_type":"","scores":[{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79676","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79747","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.7969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79719","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79726","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901221","reference_id":"1901221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901221"},{"reference_url":"https://security.archlinux.org/ASA-202011-28","reference_id":"ASA-202011-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-28"},{"reference_url":"https://security.archlinux.org/AVG-1291","reference_id":"AVG-1291","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1291"},{"reference_url":"https://security.gentoo.org/glsa/202012-10","reference_id":"GLSA-202012-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4648-1/","reference_id":"USN-4648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4648-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9983"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jdy8-m8nb-pbhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59524?format=json","vulnerability_id":"VCID-jrd5-1g2p-gyg7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30936","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75459","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044528","reference_id":"2044528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044528"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30936"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrd5-1g2p-gyg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59489?format=json","vulnerability_id":"VCID-jw1q-qa6v-kqct","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21775","reference_id":"","reference_type":"","scores":[{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70304","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70254","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986863","reference_id":"1986863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986863"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-21775"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jw1q-qa6v-kqct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41468?format=json","vulnerability_id":"VCID-k9zt-dc56-w7f8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1801.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1801.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1801","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.4796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47965","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944343","reference_id":"1944343","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944343"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1801"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9zt-dc56-w7f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33708?format=json","vulnerability_id":"VCID-kbr6-94t1-87hd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28198","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17233","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17288","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238943","reference_id":"2238943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238943"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-28198"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbr6-94t1-87hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41963?format=json","vulnerability_id":"VCID-kbzp-1gvm-b3ex","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40414","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36335","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36276","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36239","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270143","reference_id":"2270143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270143"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT213936","reference_id":"HT213936","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213936"},{"reference_url":"https://support.apple.com/en-us/HT213937","reference_id":"HT213937","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213937"},{"reference_url":"https://support.apple.com/en-us/HT213938","reference_id":"HT213938","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213938"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-40414"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbzp-1gvm-b3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69653?format=json","vulnerability_id":"VCID-kdvu-rhgt-xqat","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45878","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45848","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499","reference_id":"2366499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33717?format=json","vulnerability_id":"VCID-kj7n-3mny-wkgr","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38592","reference_id":"","reference_type":"","scores":[{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72561","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231017","reference_id":"2231017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231017"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38592"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kj7n-3mny-wkgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78307?format=json","vulnerability_id":"VCID-knds-dwjv-c3c4","summary":"webkitgtk: improper bounds checking leading to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48503","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40316","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218623","reference_id":"2218623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218623"},{"reference_url":"https://support.apple.com/en-us/HT213340","reference_id":"HT213340","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213340"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213342","reference_id":"HT213342","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213342"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-48503"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-knds-dwjv-c3c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74539?format=json","vulnerability_id":"VCID-kp4m-h6ua-h7dm","summary":"webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40776","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5928","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63204","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301841","reference_id":"2301841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301841"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40776"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kp4m-h6ua-h7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59487?format=json","vulnerability_id":"VCID-kshe-e6w9-37ez","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1844","reference_id":"","reference_type":"","scores":[{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80368","published_at":"2026-04-01T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80412","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944862","reference_id":"1944862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944862"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1844"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kshe-e6w9-37ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69655?format=json","vulnerability_id":"VCID-ksq5-ygcp-nbaz","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37915","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3794","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501","reference_id":"2366501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31205"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72613?format=json","vulnerability_id":"VCID-kuyh-x3z4-q7gf","summary":"webkit: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54505","reference_id":"","reference_type":"","scores":[{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69136","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121838","reference_id":"121838","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121838"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333844","reference_id":"2333844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[],"aliases":["CVE-2024-54505"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61851?format=json","vulnerability_id":"VCID-ky87-8zpf-nqg2","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30427","reference_id":"","reference_type":"","scores":[{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78252","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78234","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357919","reference_id":"2357919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357919"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2025-30427"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59511?format=json","vulnerability_id":"VCID-m1q1-ma7s-63bd","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30836","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31444","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31525","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31451","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034376","reference_id":"2034376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034376"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30836"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1q1-ma7s-63bd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49517?format=json","vulnerability_id":"VCID-ma6z-vrhf-mqdw","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42823","reference_id":"","reference_type":"","scores":[{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70302","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70287","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.7024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.7235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72334","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140505","reference_id":"2140505","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140505"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/04/4","reference_id":"4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/04/4"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/","reference_id":"5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/","reference_id":"AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5273","reference_id":"dsa-5273","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://www.debian.org/security/2022/dsa-5273"},{"reference_url":"https://www.debian.org/security/2022/dsa-5274","reference_id":"dsa-5274","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://www.debian.org/security/2022/dsa-5274"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://support.apple.com/en-us/HT213488"},{"reference_url":"https://support.apple.com/en-us/HT213489","reference_id":"HT213489","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://support.apple.com/en-us/HT213489"},{"reference_url":"https://support.apple.com/en-us/HT213491","reference_id":"HT213491","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://support.apple.com/en-us/HT213491"},{"reference_url":"https://support.apple.com/en-us/HT213492","reference_id":"HT213492","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://support.apple.com/en-us/HT213492"},{"reference_url":"https://support.apple.com/en-us/HT213495","reference_id":"HT213495","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://support.apple.com/en-us/HT213495"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/","reference_id":"JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5730-1/","reference_id":"USN-5730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5730-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42823"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ma6z-vrhf-mqdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49519?format=json","vulnerability_id":"VCID-maw9-2k6n-wyea","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42826","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2786","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27919","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27962","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28534","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167716","reference_id":"2167716","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167716"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"}],"url":"https://support.apple.com/en-us/HT213488"},{"reference_url":"https://support.apple.com/en-us/HT213489","reference_id":"HT213489","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"}],"url":"https://support.apple.com/en-us/HT213489"},{"reference_url":"https://support.apple.com/en-us/HT213495","reference_id":"HT213495","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/"}],"url":"https://support.apple.com/en-us/HT213495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5867-1/","reference_id":"USN-5867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5867-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42826"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-maw9-2k6n-wyea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61838?format=json","vulnerability_id":"VCID-mch4-qacj-f7ey","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44192","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43358","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353871","reference_id":"2353871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353871"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[],"aliases":["CVE-2024-44192"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77962?format=json","vulnerability_id":"VCID-mepa-3qeb-1fd6","summary":"webkitgtk: Visiting a malicious website may lead to address bar spoofing.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46725","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18367","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18168","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271446","reference_id":"2271446","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-46725"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mepa-3qeb-1fd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77959?format=json","vulnerability_id":"VCID-mfvu-9zv4-k3gq","summary":"webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32919","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21718","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21831","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271437","reference_id":"2271437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271437"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-32919"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfvu-9zv4-k3gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77961?format=json","vulnerability_id":"VCID-mjg1-q19v-gkcy","summary":"webkitgtk: Visiting a malicious website may lead to address bar spoofing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46705","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33674","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33554","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271444","reference_id":"2271444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-46705"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjg1-q19v-gkcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41967?format=json","vulnerability_id":"VCID-mu71-qcsx-33fj","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42950","reference_id":"","reference_type":"","scores":[{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70685","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271718","reference_id":"2271718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271718"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://support.apple.com/en-us/HT214040","reference_id":"HT214040","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214040"},{"reference_url":"https://support.apple.com/en-us/HT214041","reference_id":"HT214041","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214041"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2023-42950"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mu71-qcsx-33fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69651?format=json","vulnerability_id":"VCID-mvm2-2uz9-bufg","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42875","reference_id":"","reference_type":"","scores":[{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52365","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120330","reference_id":"120330","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120330"},{"reference_url":"https://support.apple.com/en-us/120947","reference_id":"120947","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120947"},{"reference_url":"https://support.apple.com/en-us/120948","reference_id":"120948","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120948"},{"reference_url":"https://support.apple.com/en-us/120949","reference_id":"120949","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120949"},{"reference_url":"https://support.apple.com/en-us/120950","reference_id":"120950","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366497","reference_id":"2366497","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366497"},{"reference_url":"https://security.archlinux.org/ASA-202505-2","reference_id":"ASA-202505-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-2"},{"reference_url":"https://security.archlinux.org/ASA-202505-3","reference_id":"ASA-202505-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-3"},{"reference_url":"https://security.archlinux.org/ASA-202505-4","reference_id":"ASA-202505-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-4"},{"reference_url":"https://security.archlinux.org/ASA-202505-5","reference_id":"ASA-202505-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-5"},{"reference_url":"https://security.archlinux.org/AVG-2867","reference_id":"AVG-2867","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2867"},{"reference_url":"https://security.archlinux.org/AVG-2868","reference_id":"AVG-2868","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2868"},{"reference_url":"https://security.archlinux.org/AVG-2869","reference_id":"AVG-2869","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2869"},{"reference_url":"https://security.archlinux.org/AVG-2870","reference_id":"AVG-2870","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-42875"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mvm2-2uz9-bufg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59486?format=json","vulnerability_id":"VCID-mz2q-gbdt-n3e2","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1826.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1826","reference_id":"","reference_type":"","scores":[{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72918","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986860","reference_id":"1986860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986860"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-1826"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mz2q-gbdt-n3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59504?format=json","vulnerability_id":"VCID-n28u-18fr-13hs","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30762.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30762","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1502","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.151","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15012","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986898","reference_id":"1986898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986898"},{"reference_url":"https://security.archlinux.org/AVG-2212","reference_id":"AVG-2212","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2212"},{"reference_url":"https://security.archlinux.org/AVG-2213","reference_id":"AVG-2213","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2213"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212548","reference_id":"HT212548","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:27:21Z/"}],"url":"https://support.apple.com/en-us/HT212548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4035","reference_id":"RHSA-2020:4035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30762"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n28u-18fr-13hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33723?format=json","vulnerability_id":"VCID-n7a4-nphm-ufam","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38611","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7113","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231022","reference_id":"2231022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231022"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38611"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7a4-nphm-ufam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61839?format=json","vulnerability_id":"VCID-n7w5-dz8n-mbht","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51336","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121563","reference_id":"121563","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121563"},{"reference_url":"https://support.apple.com/en-us/121564","reference_id":"121564","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121564"},{"reference_url":"https://support.apple.com/en-us/121565","reference_id":"121565","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121565"},{"reference_url":"https://support.apple.com/en-us/121566","reference_id":"121566","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121566"},{"reference_url":"https://support.apple.com/en-us/121569","reference_id":"121569","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121569"},{"reference_url":"https://support.apple.com/en-us/121571","reference_id":"121571","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121571"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278","reference_id":"2323278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9545","reference_id":"RHSA-2024:9545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7113-1/","reference_id":"USN-7113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7113-1/"}],"fixed_packages":[],"aliases":["CVE-2024-44244"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59497?format=json","vulnerability_id":"VCID-na3e-x43h-7kgr","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30689","reference_id":"","reference_type":"","scores":[{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.7826","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78257","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986881","reference_id":"1986881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986881"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30689"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-na3e-x43h-7kgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47881?format=json","vulnerability_id":"VCID-nhy8-sfpr-eudu","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35074","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69341","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69427","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69411","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/10","reference_id":"10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/10"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241403","reference_id":"2241403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241403"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","reference_id":"4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/8"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/9","reference_id":"9","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/9"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213936","reference_id":"HT213936","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213936"},{"reference_url":"https://support.apple.com/en-us/HT213937","reference_id":"HT213937","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213937"},{"reference_url":"https://support.apple.com/en-us/HT213938","reference_id":"HT213938","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213938"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-35074"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nhy8-sfpr-eudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59493?format=json","vulnerability_id":"VCID-nkp9-pvqf-ebcv","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30663","reference_id":"","reference_type":"","scores":[{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.7154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78848","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986872","reference_id":"1986872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986872"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212335","reference_id":"HT212335","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212335"},{"reference_url":"https://support.apple.com/en-us/HT212336","reference_id":"HT212336","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212336"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://support.apple.com/en-us/HT212532","reference_id":"HT212532","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212532"},{"reference_url":"https://support.apple.com/en-us/HT212534","reference_id":"HT212534","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30663"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nkp9-pvqf-ebcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49522?format=json","vulnerability_id":"VCID-nykh-jh9p-4bhy","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42863","reference_id":"","reference_type":"","scores":[{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.7716","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.7721","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77189","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/12/26/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/12/26/1"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156987","reference_id":"2156987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156987"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-42863"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nykh-jh9p-4bhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79032?format=json","vulnerability_id":"VCID-pbn4-npj7-7qhy","summary":"webkitgtk: out-of-bounds read was addressed with improved bounds checking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32912.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32912.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32912","reference_id":"","reference_type":"","scores":[{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81424","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81423","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81451","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01557","scoring_system":"epss","scoring_elements":"0.81466","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32912"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128645","reference_id":"2128645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128645"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/28","reference_id":"28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/39","reference_id":"39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/39"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/40","reference_id":"40","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/40"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/41","reference_id":"41","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/47","reference_id":"47","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/47"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/49","reference_id":"49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/49"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/50","reference_id":"50","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/50"},{"reference_url":"https://support.apple.com/en-us/HT213442","reference_id":"HT213442","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"https://support.apple.com/en-us/HT213442"},{"reference_url":"https://support.apple.com/en-us/HT213445","reference_id":"HT213445","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"https://support.apple.com/en-us/HT213445"},{"reference_url":"https://support.apple.com/en-us/HT213446","reference_id":"HT213446","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/"}],"url":"https://support.apple.com/en-us/HT213446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-32912"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbn4-npj7-7qhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73825?format=json","vulnerability_id":"VCID-pg5b-3vcj-7bav","summary":"webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27851","reference_id":"","reference_type":"","scores":[{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7681","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704","reference_id":"2314704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27851"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5b-3vcj-7bav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61835?format=json","vulnerability_id":"VCID-pyek-9fpp-nudy","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40866","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25704","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724","reference_id":"2312724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7079-1/","reference_id":"USN-7079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7079-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40866"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33714?format=json","vulnerability_id":"VCID-q1rs-zvcq-9kbd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37450","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16985","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223000","reference_id":"2223000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223000"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213826","reference_id":"HT213826","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213826"},{"reference_url":"https://support.apple.com/en-us/HT213841","reference_id":"HT213841","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213841"},{"reference_url":"https://support.apple.com/en-us/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213843"},{"reference_url":"https://support.apple.com/en-us/HT213846","reference_id":"HT213846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213846"},{"reference_url":"https://support.apple.com/en-us/HT213848","reference_id":"HT213848","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[],"aliases":["CVE-2023-37450"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q1rs-zvcq-9kbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74670?format=json","vulnerability_id":"VCID-q3jv-e392-5fef","summary":"webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40780","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26699","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069","reference_id":"2302069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40780"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q3jv-e392-5fef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59482?format=json","vulnerability_id":"VCID-q834-6aag-f3dx","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1788","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61031","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61136","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61151","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944859","reference_id":"1944859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944859"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1788"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q834-6aag-f3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41466?format=json","vulnerability_id":"VCID-q8gz-5f27-eqhu","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1789.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1789","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47641","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944337","reference_id":"1944337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944337"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://support.apple.com/en-us/HT212146","reference_id":"HT212146","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212146"},{"reference_url":"https://support.apple.com/en-us/HT212147","reference_id":"HT212147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212147"},{"reference_url":"https://support.apple.com/en-us/HT212148","reference_id":"HT212148","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212148"},{"reference_url":"https://support.apple.com/en-us/HT212149","reference_id":"HT212149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212149"},{"reference_url":"https://support.apple.com/en-us/HT212152","reference_id":"HT212152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212152"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/","reference_id":"JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","reference_id":"L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1789"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8gz-5f27-eqhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79304?format=json","vulnerability_id":"VCID-q8ps-wucu-73ht","summary":"webkitgtk: malicious content may lead to UI spoofing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32816.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32816","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25551","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25568","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238975","reference_id":"2238975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238975"},{"reference_url":"https://security.archlinux.org/AVG-2789","reference_id":"AVG-2789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2789"},{"reference_url":"https://security.archlinux.org/AVG-2790","reference_id":"AVG-2790","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2790"},{"reference_url":"https://security.archlinux.org/AVG-2791","reference_id":"AVG-2791","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2791"},{"reference_url":"https://support.apple.com/en-us/HT213340","reference_id":"HT213340","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T19:37:09Z/"}],"url":"https://support.apple.com/en-us/HT213340"},{"reference_url":"https://support.apple.com/en-us/HT213342","reference_id":"HT213342","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T19:37:09Z/"}],"url":"https://support.apple.com/en-us/HT213342"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T19:37:09Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5568-1/","reference_id":"USN-5568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5568-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32816"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ps-wucu-73ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59529?format=json","vulnerability_id":"VCID-qf9z-ascr-cuf6","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30954","reference_id":"","reference_type":"","scores":[{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55162","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044551","reference_id":"2044551","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044551"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30954"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qf9z-ascr-cuf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62524?format=json","vulnerability_id":"VCID-qtt7-5r89-tbg7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26709.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26709.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26709","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3685","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36753","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36686","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42158","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42184","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092733","reference_id":"2092733","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092733"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[],"aliases":["CVE-2022-26709"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtt7-5r89-tbg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74672?format=json","vulnerability_id":"VCID-qvy2-8161-eycu","summary":"webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40782","reference_id":"","reference_type":"","scores":[{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.6002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62134","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62125","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63402","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071","reference_id":"2302071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40782"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvy2-8161-eycu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60127?format=json","vulnerability_id":"VCID-qzm6-yqm1-abdh","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9806.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9806","reference_id":"","reference_type":"","scores":[{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71391","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71419","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879563","reference_id":"1879563","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879563"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9806"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm6-yqm1-abdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62515?format=json","vulnerability_id":"VCID-r24t-dva3-kub8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22590","reference_id":"","reference_type":"","scores":[{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60768","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60783","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60772","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053181","reference_id":"2053181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053181"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5306-1/","reference_id":"USN-5306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5306-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22590"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r24t-dva3-kub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47889?format=json","vulnerability_id":"VCID-r25x-h5yu-quc1","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42890","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60807","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/18/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/18/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254327","reference_id":"2254327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254327"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/6","reference_id":"6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/6"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/7","reference_id":"7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/7"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/9","reference_id":"9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/9"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://support.apple.com/en-us/HT214040","reference_id":"HT214040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214040"},{"reference_url":"https://support.apple.com/en-us/HT214041","reference_id":"HT214041","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-42890"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r25x-h5yu-quc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60123?format=json","vulnerability_id":"VCID-r27p-urrj-ckac","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13753.json","reference_id":"","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13753.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13753","reference_id":"","reference_type":"","scores":[{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.7901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79057","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79067","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79051","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79058","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879570","reference_id":"1879570","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879570"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"},{"reference_url":"https://usn.ubuntu.com/4648-1/","reference_id":"USN-4648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4648-1/"}],"fixed_packages":[],"aliases":["CVE-2020-13753"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r27p-urrj-ckac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33716?format=json","vulnerability_id":"VCID-r8td-qqvp-xbbd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38572","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67248","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231028","reference_id":"2231028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231028"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38572"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8td-qqvp-xbbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59503?format=json","vulnerability_id":"VCID-rhrs-vpu4-4qeb","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30761.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30761.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30761","reference_id":"","reference_type":"","scores":[{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54814","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54831","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54791","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66427","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986894","reference_id":"1986894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986894"},{"reference_url":"https://security.archlinux.org/AVG-2210","reference_id":"AVG-2210","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2210"},{"reference_url":"https://security.archlinux.org/AVG-2211","reference_id":"AVG-2211","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2211"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212548","reference_id":"HT212548","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:27:48Z/"}],"url":"https://support.apple.com/en-us/HT212548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4035","reference_id":"RHSA-2020:4035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30761"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rhrs-vpu4-4qeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61850?format=json","vulnerability_id":"VCID-rj9q-8rw3-qbbn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264","reference_id":"","reference_type":"","scores":[{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.8031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80316","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918","reference_id":"2357918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24264"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62533?format=json","vulnerability_id":"VCID-rquw-cmsc-tka8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32893","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37338","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37166","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/29/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/29/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/13/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/13/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/02/10","reference_id":"10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/02/10"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Aug/16","reference_id":"16","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Aug/16"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/26/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/26/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/29/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/29/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2121645","reference_id":"2121645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2121645"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/49","reference_id":"49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/49"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/25/5","reference_id":"5","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/25/5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/","reference_id":"7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/"},{"reference_url":"https://security.archlinux.org/AVG-2819","reference_id":"AVG-2819","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2819"},{"reference_url":"https://security.archlinux.org/AVG-2820","reference_id":"AVG-2820","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2820"},{"reference_url":"https://www.debian.org/security/2022/dsa-5219","reference_id":"dsa-5219","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5219"},{"reference_url":"https://www.debian.org/security/2022/dsa-5220","reference_id":"dsa-5220","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5220"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213412","reference_id":"HT213412","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213412"},{"reference_url":"https://support.apple.com/en-us/HT213413","reference_id":"HT213413","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213413"},{"reference_url":"https://support.apple.com/en-us/HT213414","reference_id":"HT213414","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213414"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6540","reference_id":"RHSA-2022:6540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6634","reference_id":"RHSA-2022:6634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5611-1/","reference_id":"USN-5611-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5611-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/","reference_id":"YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/"}],"fixed_packages":[],"aliases":["CVE-2022-32893"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rquw-cmsc-tka8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41964?format=json","vulnerability_id":"VCID-rspt-fzz1-vudp","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42833","reference_id":"","reference_type":"","scores":[{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6964","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69657","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69664","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270146","reference_id":"2270146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270146"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT213938","reference_id":"HT213938","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"https://support.apple.com/en-us/HT213938"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-42833"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rspt-fzz1-vudp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49516?format=json","vulnerability_id":"VCID-ryxv-e8de-q7h8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42799","reference_id":"","reference_type":"","scores":[{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.6426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.6692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66964","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66951","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140503","reference_id":"2140503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140503"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5730-1/","reference_id":"USN-5730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5730-1/"}],"fixed_packages":[],"aliases":["CVE-2022-42799"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ryxv-e8de-q7h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31096?format=json","vulnerability_id":"VCID-rzp6-zzmc-cff3","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9862.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9862","reference_id":"","reference_type":"","scores":[{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59176","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59237","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59287","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59303","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59285","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879532","reference_id":"1879532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879532"},{"reference_url":"https://security.gentoo.org/glsa/202007-61","reference_id":"GLSA-202007-61","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-61"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4444-1/","reference_id":"USN-4444-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4444-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9862"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzp6-zzmc-cff3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62532?format=json","vulnerability_id":"VCID-s239-gjv2-qqdg","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32792.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32792","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52762","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52791","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238973","reference_id":"2238973","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238973"},{"reference_url":"https://security.archlinux.org/AVG-2789","reference_id":"AVG-2789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2789"},{"reference_url":"https://security.archlinux.org/AVG-2790","reference_id":"AVG-2790","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2790"},{"reference_url":"https://security.archlinux.org/AVG-2791","reference_id":"AVG-2791","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2791"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213340","reference_id":"HT213340","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213340"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213342","reference_id":"HT213342","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213342"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5568-1/","reference_id":"USN-5568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5568-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32792"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s239-gjv2-qqdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59488?format=json","vulnerability_id":"VCID-s51n-1ms6-xydk","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1871","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73949","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73939","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944867","reference_id":"1944867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944867"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://www.debian.org/security/2021/dsa-4923","reference_id":"dsa-4923","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://www.debian.org/security/2021/dsa-4923"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212146","reference_id":"HT212146","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://support.apple.com/en-us/HT212146"},{"reference_url":"https://support.apple.com/en-us/HT212147","reference_id":"HT212147","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://support.apple.com/en-us/HT212147"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","reference_id":"L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1871"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s51n-1ms6-xydk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78308?format=json","vulnerability_id":"VCID-sby7-u527-fqfg","summary":"webkitgtk: memory corruption issue leading to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32435","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46194","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46189","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218626","reference_id":"2218626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218626"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://support.apple.com/en-us/HT213671","reference_id":"HT213671","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213671"},{"reference_url":"https://support.apple.com/en-us/HT213676","reference_id":"HT213676","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213676"},{"reference_url":"https://support.apple.com/en-us/HT213811","reference_id":"HT213811","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[],"aliases":["CVE-2023-32435"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sby7-u527-fqfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60124?format=json","vulnerability_id":"VCID-sf71-zb7h-xycs","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9802.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9802","reference_id":"","reference_type":"","scores":[{"value":"0.41488","scoring_system":"epss","scoring_elements":"0.97381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.41488","scoring_system":"epss","scoring_elements":"0.97405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.41488","scoring_system":"epss","scoring_elements":"0.97387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.41488","scoring_system":"epss","scoring_elements":"0.97392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.41488","scoring_system":"epss","scoring_elements":"0.97394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.41488","scoring_system":"epss","scoring_elements":"0.97401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.41488","scoring_system":"epss","scoring_elements":"0.97403","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879545","reference_id":"1879545","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879545"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://support.apple.com/HT211168","reference_id":"HT211168","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/"}],"url":"https://support.apple.com/HT211168"},{"reference_url":"https://support.apple.com/HT211171","reference_id":"HT211171","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/"}],"url":"https://support.apple.com/HT211171"},{"reference_url":"https://support.apple.com/HT211175","reference_id":"HT211175","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/"}],"url":"https://support.apple.com/HT211175"},{"reference_url":"https://support.apple.com/HT211177","reference_id":"HT211177","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/"}],"url":"https://support.apple.com/HT211177"},{"reference_url":"https://support.apple.com/HT211178","reference_id":"HT211178","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/"}],"url":"https://support.apple.com/HT211178"},{"reference_url":"https://support.apple.com/HT211179","reference_id":"HT211179","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/"}],"url":"https://support.apple.com/HT211179"},{"reference_url":"https://support.apple.com/HT211181","reference_id":"HT211181","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/"}],"url":"https://support.apple.com/HT211181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9802"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sf71-zb7h-xycs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49511?format=json","vulnerability_id":"VCID-shfm-129h-47ha","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32885","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40784","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4075","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236842","reference_id":"2236842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236842"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32885"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shfm-129h-47ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59525?format=json","vulnerability_id":"VCID-sxja-mn3n-hkgt","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30951","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75459","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044534","reference_id":"2044534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044534"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30951"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxja-mn3n-hkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62518?format=json","vulnerability_id":"VCID-t6ad-d451-k3cy","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22624.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22624","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63936","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63935","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073893","reference_id":"2073893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073893"},{"reference_url":"https://security.archlinux.org/AVG-2703","reference_id":"AVG-2703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2703"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213182","reference_id":"HT213182","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/"}],"url":"https://support.apple.com/en-us/HT213182"},{"reference_url":"https://support.apple.com/en-us/HT213186","reference_id":"HT213186","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/"}],"url":"https://support.apple.com/en-us/HT213186"},{"reference_url":"https://support.apple.com/en-us/HT213187","reference_id":"HT213187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/"}],"url":"https://support.apple.com/en-us/HT213187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5394-1/","reference_id":"USN-5394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5394-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22624"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ad-d451-k3cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59509?format=json","vulnerability_id":"VCID-tc8n-sk6n-z7f3","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30818","reference_id":"","reference_type":"","scores":[{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62695","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62747","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62713","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034368","reference_id":"2034368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034368"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30818"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8n-sk6n-z7f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49526?format=json","vulnerability_id":"VCID-tmt1-qwc9-nfhs","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46698","reference_id":"","reference_type":"","scores":[{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76613","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76593","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76617","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00969","scoring_system":"epss","scoring_elements":"0.76623","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/20","reference_id":"20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156992","reference_id":"2156992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2156992"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/26","reference_id":"26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/27","reference_id":"27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/28","reference_id":"28","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/28"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://support.apple.com/en-us/HT213535","reference_id":"HT213535","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"https://support.apple.com/en-us/HT213535"},{"reference_url":"https://support.apple.com/en-us/HT213536","reference_id":"HT213536","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"https://support.apple.com/en-us/HT213536"},{"reference_url":"https://support.apple.com/en-us/HT213537","reference_id":"HT213537","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"https://support.apple.com/en-us/HT213537"},{"reference_url":"https://support.apple.com/en-us/HT213538","reference_id":"HT213538","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/"}],"url":"https://support.apple.com/en-us/HT213538"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5797-1/","reference_id":"USN-5797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5797-1/"}],"fixed_packages":[],"aliases":["CVE-2022-46698"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmt1-qwc9-nfhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72701?format=json","vulnerability_id":"VCID-tqb3-nabh-tkeh","summary":"webkitgtk: data isolation bypass vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44309","reference_id":"","reference_type":"","scores":[{"value":"0.01158","scoring_system":"epss","scoring_elements":"0.78526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79557","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.7954","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121752","reference_id":"121752","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121752"},{"reference_url":"https://support.apple.com/en-us/121753","reference_id":"121753","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121753"},{"reference_url":"https://support.apple.com/en-us/121754","reference_id":"121754","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121754"},{"reference_url":"https://support.apple.com/en-us/121755","reference_id":"121755","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121755"},{"reference_url":"https://support.apple.com/en-us/121756","reference_id":"121756","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121756"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327927","reference_id":"2327927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10472","reference_id":"RHSA-2024:10472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10480","reference_id":"RHSA-2024:10480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10482","reference_id":"RHSA-2024:10482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10483","reference_id":"RHSA-2024:10483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10489","reference_id":"RHSA-2024:10489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10492","reference_id":"RHSA-2024:10492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10496","reference_id":"RHSA-2024:10496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10501","reference_id":"RHSA-2024:10501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7142-1/","reference_id":"USN-7142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7142-1/"}],"fixed_packages":[],"aliases":["CVE-2024-44309"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqb3-nabh-tkeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59510?format=json","vulnerability_id":"VCID-tyra-54yq-4ff6","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30823","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3869","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034373","reference_id":"2034373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034373"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30823"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tyra-54yq-4ff6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47471?format=json","vulnerability_id":"VCID-u1sp-38g8-xfan","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558","reference_id":"","reference_type":"","scores":[{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.84992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689","reference_id":"2279689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689"},{"reference_url":"https://issues.chromium.org/issues/337766133","reference_id":"337766133","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://issues.chromium.org/issues/337766133"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","reference_id":"BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","reference_id":"FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","reference_id":"stable-channel-update-for-desktop_7.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-4558"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61845?format=json","vulnerability_id":"VCID-u9g4-5f16-yqc9","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24209","reference_id":"","reference_type":"","scores":[{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85468","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85497","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.8551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87339","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122376","reference_id":"122376","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122376"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357911","reference_id":"2357911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357911"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24209"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47887?format=json","vulnerability_id":"VCID-uugz-x8q6-fbe4","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41993","reference_id":"","reference_type":"","scores":[{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96109","published_at":"2026-04-13T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96107","published_at":"2026-04-12T12:55:00Z"},{"value":"0.24891","scoring_system":"epss","scoring_elements":"0.96134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.24891","scoring_system":"epss","scoring_elements":"0.96127","published_at":"2026-04-02T12:55:00Z"},{"value":"0.24891","scoring_system":"epss","scoring_elements":"0.96139","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240522","reference_id":"2240522","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240522"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0004/","reference_id":"ntap-20240426-0004","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6426-1/","reference_id":"USN-6426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6426-1/"}],"fixed_packages":[],"aliases":["CVE-2023-41993"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uugz-x8q6-fbe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73820?format=json","vulnerability_id":"VCID-v1he-6exf-b7dt","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27820","reference_id":"","reference_type":"","scores":[{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.7959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698","reference_id":"2314698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27820"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v1he-6exf-b7dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59499?format=json","vulnerability_id":"VCID-v6kn-1ygj-8kfe","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30734","reference_id":"","reference_type":"","scores":[{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77787","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77847","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77804","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77832","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986886","reference_id":"1986886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986886"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30734"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6kn-1ygj-8kfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41973?format=json","vulnerability_id":"VCID-vbyq-sqqw-c3bm","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23252.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23252.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270288","reference_id":"2270288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270288"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2024-23252"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbyq-sqqw-c3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60129?format=json","vulnerability_id":"VCID-vh6x-1uak-6bh4","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9843.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9843.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9843","reference_id":"","reference_type":"","scores":[{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72206","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72187","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72199","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879566","reference_id":"1879566","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879566"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9843"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh6x-1uak-6bh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41962?format=json","vulnerability_id":"VCID-vh6y-51ne-cuhh","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1745","reference_id":"","reference_type":"","scores":[{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74077","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74099","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1030270","reference_id":"1030270","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://www.securitytracker.com/id/1030270"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270151","reference_id":"2270151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270151"},{"reference_url":"http://secunia.com/advisories/58920","reference_id":"58920","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://secunia.com/advisories/58920"},{"reference_url":"http://secunia.com/advisories/59155","reference_id":"59155","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://secunia.com/advisories/59155"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://src.chromium.org/viewvc/blink?revision=167993&view=revision","reference_id":"blink?revision=167993&view=revision","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"https://src.chromium.org/viewvc/blink?revision=167993&view=revision"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=346192","reference_id":"detail?id=346192","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"https://code.google.com/p/chromium/issues/detail?id=346192"},{"reference_url":"http://www.debian.org/security/2014/dsa-2939","reference_id":"dsa-2939","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://www.debian.org/security/2014/dsa-2939"},{"reference_url":"https://security.gentoo.org/glsa/201408-16","reference_id":"GLSA-201408-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-16"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html","reference_id":"msg00023.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html","reference_id":"stable-channel-update_20.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"}],"fixed_packages":[],"aliases":["CVE-2014-1745"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh6y-51ne-cuhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41974?format=json","vulnerability_id":"VCID-vqd7-gwyv-vfaf","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23254","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66263","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270289","reference_id":"2270289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270289"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/26","reference_id":"26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/26"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214087","reference_id":"HT214087","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214087"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[],"aliases":["CVE-2024-23254"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqd7-gwyv-vfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33718?format=json","vulnerability_id":"VCID-vt3f-hrb1-33cw","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38594","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63069","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67011","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231018","reference_id":"2231018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231018"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38594"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3f-hrb1-33cw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33719?format=json","vulnerability_id":"VCID-vwaa-vyn9-d3ey","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38595","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76836","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76847","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231019","reference_id":"2231019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231019"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38595"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwaa-vyn9-d3ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79866?format=json","vulnerability_id":"VCID-vy4b-6bqk-8ka1","summary":"webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45481.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45481.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45481","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08095","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08078","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040327","reference_id":"2040327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-45481"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vy4b-6bqk-8ka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62528?format=json","vulnerability_id":"VCID-w98c-tpu4-ufa2","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26719.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26719","reference_id":"","reference_type":"","scores":[{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50963","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57379","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092736","reference_id":"2092736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092736"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[],"aliases":["CVE-2022-26719"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w98c-tpu4-ufa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48048?format=json","vulnerability_id":"VCID-wav5-7p9t-qka9","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13543.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13543","reference_id":"","reference_type":"","scores":[{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.81049","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.81113","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.81134","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.8112","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.81058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.81082","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.8111","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01497","scoring_system":"epss","scoring_elements":"0.81116","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1903568","reference_id":"1903568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1903568"},{"reference_url":"https://security.archlinux.org/ASA-202011-28","reference_id":"ASA-202011-28","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-28"},{"reference_url":"https://security.archlinux.org/AVG-1291","reference_id":"AVG-1291","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1291"},{"reference_url":"https://security.gentoo.org/glsa/202012-10","reference_id":"GLSA-202012-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2020-13543"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wav5-7p9t-qka9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71952?format=json","vulnerability_id":"VCID-wbn4-ea3w-k7f3","summary":"webkitgtk: Processing web content may lead to a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24158","reference_id":"","reference_type":"","scores":[{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.74985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75057","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344623","reference_id":"2344623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24158"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59484?format=json","vulnerability_id":"VCID-wc2v-987f-mqhn","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1820.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1820.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1820","reference_id":"","reference_type":"","scores":[{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73527","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73522","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986856","reference_id":"1986856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986856"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-1820"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc2v-987f-mqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49514?format=json","vulnerability_id":"VCID-wfjx-2djn-tket","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32891.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32891.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32891","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25089","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25149","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25107","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128647","reference_id":"2128647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2128647"},{"reference_url":"https://security.archlinux.org/AVG-2819","reference_id":"AVG-2819","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2819"},{"reference_url":"https://security.archlinux.org/AVG-2820","reference_id":"AVG-2820","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2820"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213442","reference_id":"HT213442","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/"}],"url":"https://support.apple.com/en-us/HT213442"},{"reference_url":"https://support.apple.com/en-us/HT213446","reference_id":"HT213446","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/"}],"url":"https://support.apple.com/en-us/HT213446"},{"reference_url":"https://support.apple.com/en-us/HT213486","reference_id":"HT213486","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/"}],"url":"https://support.apple.com/en-us/HT213486"},{"reference_url":"https://support.apple.com/en-us/HT213487","reference_id":"HT213487","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/"}],"url":"https://support.apple.com/en-us/HT213487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-32891"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfjx-2djn-tket"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62516?format=json","vulnerability_id":"VCID-wht8-k729-nyh9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22592","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39357","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053185","reference_id":"2053185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053185"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5306-1/","reference_id":"USN-5306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5306-1/"}],"fixed_packages":[],"aliases":["CVE-2022-22592"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wht8-k729-nyh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77907?format=json","vulnerability_id":"VCID-wn9z-vusf-yycn","summary":"webkitgtk: processing a malicious image may lead to a denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42883","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05954","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06013","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/18/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/18/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254326","reference_id":"2254326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254326"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/6","reference_id":"6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/6"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/7","reference_id":"7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/7"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/8","reference_id":"8","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/9","reference_id":"9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/9"},{"reference_url":"https://www.debian.org/security/2023/dsa-5580","reference_id":"dsa-5580","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://www.debian.org/security/2023/dsa-5580"},{"reference_url":"https://support.apple.com/en-us/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214034"},{"reference_url":"https://support.apple.com/kb/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/kb/HT214034"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://support.apple.com/en-us/HT214040","reference_id":"HT214040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214040"},{"reference_url":"https://support.apple.com/en-us/HT214041","reference_id":"HT214041","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6582-1/","reference_id":"USN-6582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6582-1/"}],"fixed_packages":[],"aliases":["CVE-2023-42883"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wn9z-vusf-yycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59517?format=json","vulnerability_id":"VCID-wpw7-2u4z-muey","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30884","reference_id":"","reference_type":"","scores":[{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37518","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.377","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37647","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.3762","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034378","reference_id":"2034378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034378"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30884"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpw7-2u4z-muey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47883?format=json","vulnerability_id":"VCID-x25m-k9px-2ubs","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39928","reference_id":"","reference_type":"","scores":[{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38957","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38971","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38918","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241400","reference_id":"2241400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241400"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6426-1/","reference_id":"USN-6426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6426-1/"}],"fixed_packages":[],"aliases":["CVE-2023-39928"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x25m-k9px-2ubs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59495?format=json","vulnerability_id":"VCID-x5us-y2sc-mkg5","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30666.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30666","reference_id":"","reference_type":"","scores":[{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.8223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82194","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.8219","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986877","reference_id":"1986877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986877"},{"reference_url":"https://security.archlinux.org/AVG-2210","reference_id":"AVG-2210","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2210"},{"reference_url":"https://security.archlinux.org/AVG-2211","reference_id":"AVG-2211","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2211"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:57Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4035","reference_id":"RHSA-2020:4035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30666"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5us-y2sc-mkg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47888?format=json","vulnerability_id":"VCID-x73g-k7yh-qydd","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42852","reference_id":"","reference_type":"","scores":[{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84332","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84309","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/15/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/15/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/19","reference_id":"19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/22","reference_id":"22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/22"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271456","reference_id":"2271456","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271456"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/23","reference_id":"23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/23"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/24","reference_id":"24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/24"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/25","reference_id":"25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/25"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/27"},{"reference_url":"https://www.debian.org/security/2023/dsa-5557","reference_id":"dsa-5557","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://www.debian.org/security/2023/dsa-5557"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213981","reference_id":"HT213981","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213981"},{"reference_url":"https://support.apple.com/en-us/HT213982","reference_id":"HT213982","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213982"},{"reference_url":"https://support.apple.com/en-us/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213984"},{"reference_url":"https://support.apple.com/kb/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/kb/HT213984"},{"reference_url":"https://support.apple.com/en-us/HT213986","reference_id":"HT213986","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213986"},{"reference_url":"https://support.apple.com/en-us/HT213987","reference_id":"HT213987","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213987"},{"reference_url":"https://support.apple.com/en-us/HT213988","reference_id":"HT213988","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","reference_id":"RPPMOWFYZODONTA3RLZOKSGNR4DELGG2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","reference_id":"S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/"},{"reference_url":"https://usn.ubuntu.com/6490-1/","reference_id":"USN-6490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6490-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","reference_id":"ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/"}],"fixed_packages":[],"aliases":["CVE-2023-42852"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x73g-k7yh-qydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59526?format=json","vulnerability_id":"VCID-xq1c-h5v5-77bs","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30952","reference_id":"","reference_type":"","scores":[{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.7957","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/01/21/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/01/21/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044538","reference_id":"2044538","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044538"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/","reference_id":"7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5060","reference_id":"dsa-5060","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://www.debian.org/security/2022/dsa-5060"},{"reference_url":"https://www.debian.org/security/2022/dsa-5061","reference_id":"dsa-5061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://www.debian.org/security/2022/dsa-5061"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/","reference_id":"HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"},{"reference_url":"https://support.apple.com/en-us/HT212975","reference_id":"HT212975","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212975"},{"reference_url":"https://support.apple.com/en-us/HT212976","reference_id":"HT212976","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212976"},{"reference_url":"https://support.apple.com/en-us/HT212978","reference_id":"HT212978","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212978"},{"reference_url":"https://support.apple.com/en-us/HT212980","reference_id":"HT212980","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212980"},{"reference_url":"https://support.apple.com/en-us/HT212982","reference_id":"HT212982","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30952"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xq1c-h5v5-77bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33724?format=json","vulnerability_id":"VCID-xqyu-yhx3-f7fq","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397","reference_id":"","reference_type":"","scores":[{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78875","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945","reference_id":"2238945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-40397"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqyu-yhx3-f7fq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41459?format=json","vulnerability_id":"VCID-xstk-j7zq-e3bh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13558.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13558","reference_id":"","reference_type":"","scores":[{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.6935","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69446","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69407","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1928886","reference_id":"1928886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1928886"},{"reference_url":"https://security.archlinux.org/AVG-1571","reference_id":"AVG-1571","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1571"},{"reference_url":"https://security.archlinux.org/AVG-1572","reference_id":"AVG-1572","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1572"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4739-1/","reference_id":"USN-4739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4739-1/"}],"fixed_packages":[],"aliases":["CVE-2020-13558"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xstk-j7zq-e3bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49513?format=json","vulnerability_id":"VCID-xzgb-egkw-9kdn","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32888","reference_id":"","reference_type":"","scores":[{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.7202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72046","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.72034","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00702","scoring_system":"epss","scoring_elements":"0.71995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73943","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140501","reference_id":"2140501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140501"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/04/4","reference_id":"4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/04/4"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213443","reference_id":"HT213443","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://support.apple.com/en-us/HT213443"},{"reference_url":"https://support.apple.com/en-us/HT213444","reference_id":"HT213444","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://support.apple.com/en-us/HT213444"},{"reference_url":"https://support.apple.com/en-us/HT213445","reference_id":"HT213445","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://support.apple.com/en-us/HT213445"},{"reference_url":"https://support.apple.com/en-us/HT213446","reference_id":"HT213446","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://support.apple.com/en-us/HT213446"},{"reference_url":"https://support.apple.com/en-us/HT213486","reference_id":"HT213486","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://support.apple.com/en-us/HT213486"},{"reference_url":"https://support.apple.com/en-us/HT213487","reference_id":"HT213487","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://support.apple.com/en-us/HT213487"},{"reference_url":"https://support.apple.com/en-us/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/"}],"url":"https://support.apple.com/en-us/HT213488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5730-1/","reference_id":"USN-5730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5730-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32888"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xzgb-egkw-9kdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72612?format=json","vulnerability_id":"VCID-y388-97uu-3qax","summary":"webkit: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54534","reference_id":"","reference_type":"","scores":[{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77729","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333846","reference_id":"2333846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333846"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-54534"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y388-97uu-3qax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60130?format=json","vulnerability_id":"VCID-y4mh-xhvx-yubd","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9850.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9850.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9850","reference_id":"","reference_type":"","scores":[{"value":"0.82826","scoring_system":"epss","scoring_elements":"0.99236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.82826","scoring_system":"epss","scoring_elements":"0.99247","published_at":"2026-04-12T12:55:00Z"},{"value":"0.82826","scoring_system":"epss","scoring_elements":"0.99245","published_at":"2026-04-08T12:55:00Z"},{"value":"0.82826","scoring_system":"epss","scoring_elements":"0.99246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.82826","scoring_system":"epss","scoring_elements":"0.99238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.82826","scoring_system":"epss","scoring_elements":"0.9924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.82826","scoring_system":"epss","scoring_elements":"0.99244","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879568","reference_id":"1879568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879568"},{"reference_url":"https://security.archlinux.org/ASA-202007-1","reference_id":"ASA-202007-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202007-1"},{"reference_url":"https://security.archlinux.org/AVG-1203","reference_id":"AVG-1203","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1203"},{"reference_url":"https://security.gentoo.org/glsa/202007-11","reference_id":"GLSA-202007-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4422-1/","reference_id":"USN-4422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4422-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9850"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4mh-xhvx-yubd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74671?format=json","vulnerability_id":"VCID-y77v-hwy6-hfhy","summary":"webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40779","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08573","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070","reference_id":"2302070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40779"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y77v-hwy6-hfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41972?format=json","vulnerability_id":"VCID-ya13-9pc8-n3ht","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23222","reference_id":"","reference_type":"","scores":[{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69723","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69709","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70115","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/118479","reference_id":"118479","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/118479"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120305","reference_id":"120305","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120305"},{"reference_url":"https://support.apple.com/en-us/120307","reference_id":"120307","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120307"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120310","reference_id":"120310","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120310"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259893","reference_id":"2259893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259893"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6631-1/","reference_id":"USN-6631-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6631-1/"}],"fixed_packages":[],"aliases":["CVE-2024-23222"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ya13-9pc8-n3ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73818?format=json","vulnerability_id":"VCID-ydxt-4h1z-1kh8","summary":"webkitgtk: A malicious website may cause unexpected cross-origin behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23271","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20254","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24593","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23271"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120306","reference_id":"120306","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120306"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314696","reference_id":"2314696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314696"},{"reference_url":"https://support.apple.com/en-us/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214055"},{"reference_url":"https://support.apple.com/kb/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214055"},{"reference_url":"https://support.apple.com/en-us/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214056"},{"reference_url":"https://support.apple.com/kb/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214056"},{"reference_url":"https://support.apple.com/en-us/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214059"},{"reference_url":"https://support.apple.com/kb/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214059"},{"reference_url":"https://support.apple.com/en-us/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214060"},{"reference_url":"https://support.apple.com/kb/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214060"},{"reference_url":"https://support.apple.com/en-us/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214061"},{"reference_url":"https://support.apple.com/kb/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-23271"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydxt-4h1z-1kh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49538?format=json","vulnerability_id":"VCID-ygd8-6k3t-quck","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27954","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40743","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236844","reference_id":"2236844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236844"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://support.apple.com/en-us/HT213671","reference_id":"HT213671","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213671"},{"reference_url":"https://support.apple.com/en-us/HT213673","reference_id":"HT213673","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213673"},{"reference_url":"https://support.apple.com/en-us/HT213674","reference_id":"HT213674","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213674"},{"reference_url":"https://support.apple.com/en-us/HT213676","reference_id":"HT213676","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213676"},{"reference_url":"https://support.apple.com/en-us/HT213678","reference_id":"HT213678","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2023-27954"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygd8-6k3t-quck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59496?format=json","vulnerability_id":"VCID-yjt8-b6qu-m7ag","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30682","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58714","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5883","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986879","reference_id":"1986879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986879"},{"reference_url":"https://security.archlinux.org/AVG-2216","reference_id":"AVG-2216","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2216"},{"reference_url":"https://security.archlinux.org/AVG-2217","reference_id":"AVG-2217","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2217"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30682"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yjt8-b6qu-m7ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42835?format=json","vulnerability_id":"VCID-yq37-cpqv-nyer","summary":"Multiple vulnerabilities have been found in Chromium and Google\n\t  Chrome, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0108.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0108.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0108","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56186","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56157","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37957","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37957"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37958","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37958"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37963","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37980","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37980"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37986","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37986"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38014","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38019","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4056"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4057","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4057"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0102","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0102"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0107","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0107"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0109","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0110","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0110"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0113"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037469","reference_id":"2037469","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037469"},{"reference_url":"https://security.gentoo.org/glsa/202201-02","reference_id":"GLSA-202201-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202201-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2022-0108"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yq37-cpqv-nyer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33713?format=json","vulnerability_id":"VCID-ytw3-vz3r-rqdd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32439","reference_id":"","reference_type":"","scores":[{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78557","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.7859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78596","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32439"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218640","reference_id":"2218640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218640"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213811","reference_id":"HT213811","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213811"},{"reference_url":"https://support.apple.com/en-us/HT213813","reference_id":"HT213813","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213813"},{"reference_url":"https://support.apple.com/en-us/HT213814","reference_id":"HT213814","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213814"},{"reference_url":"https://support.apple.com/kb/HT213814","reference_id":"HT213814","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/kb/HT213814"},{"reference_url":"https://support.apple.com/en-us/HT213816","reference_id":"HT213816","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213816"},{"reference_url":"https://support.apple.com/kb/HT213816","reference_id":"HT213816","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/kb/HT213816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[],"aliases":["CVE-2023-32439"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ytw3-vz3r-rqdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48051?format=json","vulnerability_id":"VCID-zp51-2hhv-fqhq","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9951.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9951","reference_id":"","reference_type":"","scores":[{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83565","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01995","scoring_system":"epss","scoring_elements":"0.83626","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901216","reference_id":"1901216","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1901216"},{"reference_url":"https://security.archlinux.org/AVG-1293","reference_id":"AVG-1293","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1293"},{"reference_url":"https://security.gentoo.org/glsa/202012-10","reference_id":"GLSA-202012-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4648-1/","reference_id":"USN-4648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4648-1/"}],"fixed_packages":[],"aliases":["CVE-2020-9951"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zp51-2hhv-fqhq"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkitgtk4@2.48.3-2%3Farch=el7_9"}