{"url":"http://public2.vulnerablecode.io/api/packages/89508?format=json","purl":"pkg:rpm/redhat/webkit2gtk3@2.48.5-1?arch=el8_4","type":"rpm","namespace":"redhat","name":"webkit2gtk3","version":"2.48.5-1","qualifiers":{"arch":"el8_4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61856?format=json","vulnerability_id":"VCID-1vsk-e1mf-6uaz","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29953","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29906","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273","reference_id":"2386273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61852?format=json","vulnerability_id":"VCID-3k6e-zz11-93bn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28387","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268","reference_id":"2386268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31273"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61855?format=json","vulnerability_id":"VCID-5q44-vqhn-zydx","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26334","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26221","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271","reference_id":"2386271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43212"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61860?format=json","vulnerability_id":"VCID-hvj6-wsg9-1bhg","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05436","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276","reference_id":"2386276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43265"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61859?format=json","vulnerability_id":"VCID-nu9v-3xak-77aw","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09128","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385","reference_id":"2384385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43240"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61857?format=json","vulnerability_id":"VCID-r857-ke39-xug8","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34668","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274","reference_id":"2386274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43227"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68659?format=json","vulnerability_id":"VCID-vk4e-qufz-5ffp","summary":"angle: insufficient input validation can cause undefined behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37984","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44426","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254","reference_id":"2380254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254"},{"reference_url":"https://issues.chromium.org/issues/427162086","reference_id":"427162086","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://issues.chromium.org/issues/427162086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html","reference_id":"stable-channel-update-for-desktop_15.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-6558"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61854?format=json","vulnerability_id":"VCID-wnxh-854z-ykfk","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04965","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04943","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270","reference_id":"2386270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-43211"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61853?format=json","vulnerability_id":"VCID-yg6b-hsst-ckaa","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28568","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269","reference_id":"2386269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31278"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.48.5-1%3Farch=el8_4"}