{"url":"http://public2.vulnerablecode.io/api/packages/86898?format=json","purl":"pkg:rpm/redhat/webkit2gtk3@2.50.3-2?arch=el8_6","type":"rpm","namespace":"redhat","name":"webkit2gtk3","version":"2.50.3-2","qualifiers":{"arch":"el8_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66399?format=json","vulnerability_id":"VCID-2hr6-uu49-1qb7","summary":"webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22388","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576","reference_id":"2418576","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13947","reference_id":"CVE-2025-13947","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[],"aliases":["CVE-2025-13947"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66451?format=json","vulnerability_id":"VCID-2pgr-9muu-s3ge","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16305","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337","reference_id":"2416337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43443"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66445?format=json","vulnerability_id":"VCID-7j7p-hnbd-hudk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13587","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14338","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330","reference_id":"2416330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43429"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66446?format=json","vulnerability_id":"VCID-ahcu-937r-57fu","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27201","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331","reference_id":"2416331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43430"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64209?format=json","vulnerability_id":"VCID-bjtx-twmy-jbgk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784","reference_id":"2448784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[],"aliases":["CVE-2025-43438"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66367?format=json","vulnerability_id":"VCID-ems1-41u6-vbex","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21892","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22678","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855","reference_id":"2418855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43458"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66453?format=json","vulnerability_id":"VCID-epzj-t14z-43d2","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08344","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08623","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355","reference_id":"2416355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43421"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66443?format=json","vulnerability_id":"VCID-gqjq-p4re-gkf6","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327","reference_id":"2416327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43425"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66449?format=json","vulnerability_id":"VCID-mfg4-2ma4-3qgj","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335","reference_id":"2416335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43434"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66447?format=json","vulnerability_id":"VCID-mhfm-j5xm-wybd","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332","reference_id":"2416332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43431"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66450?format=json","vulnerability_id":"VCID-pwqw-z8jj-abfs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12161","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13044","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336","reference_id":"2416336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43440"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66448?format=json","vulnerability_id":"VCID-qytm-81jk-muhc","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334","reference_id":"2416334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43432"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66368?format=json","vulnerability_id":"VCID-stjs-xknd-zfgh","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27675","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857","reference_id":"2418857","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-66287","reference_id":"CVE-2025-66287","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-66287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"},{"reference_url":"https://webkitgtk.org/security/WSA-2025-0009.html","reference_id":"WSA-2025-0009.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://webkitgtk.org/security/WSA-2025-0009.html"}],"fixed_packages":[],"aliases":["CVE-2025-66287"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66444?format=json","vulnerability_id":"VCID-u6k6-1hmc-tfaf","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20366","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329","reference_id":"2416329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43427"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64208?format=json","vulnerability_id":"VCID-unu1-sbnm-27bf","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14014","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783","reference_id":"2448783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[],"aliases":["CVE-2025-43433"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66441?format=json","vulnerability_id":"VCID-w3r3-11kt-2ydu","summary":"webkitgtk: A website may exfiltrate image data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08987","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325","reference_id":"2416325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43392"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64210?format=json","vulnerability_id":"VCID-xpp8-357g-c7gp","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785","reference_id":"2448785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[],"aliases":["CVE-2025-43441"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66431?format=json","vulnerability_id":"VCID-xr5y-1ebg-xqcj","summary":"webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502","reference_id":"","reference_type":"","scores":[{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29431","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300","reference_id":"2416300","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13502","reference_id":"CVE-2025-13502","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[],"aliases":["CVE-2025-13502"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.50.3-2%3Farch=el8_6"}