Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/webkit2gtk3@2.46.3-1?arch=el9_2
Typerpm
Namespaceredhat
Namewebkit2gtk3
Version2.46.3-1
Qualifiers
arch el9_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1e6d-p4fv-rubk
vulnerability_id VCID-1e6d-p4fv-rubk
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
reference_id
reference_type
scores
0
value 0.00822
scoring_system epss
scoring_elements 0.7442
published_at 2026-04-13T12:55:00Z
1
value 0.00822
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-04T12:55:00Z
2
value 0.00822
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-07T12:55:00Z
3
value 0.00822
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-08T12:55:00Z
4
value 0.00822
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-09T12:55:00Z
5
value 0.00822
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-11T12:55:00Z
6
value 0.00822
scoring_system epss
scoring_elements 0.74429
published_at 2026-04-12T12:55:00Z
7
value 0.01092
scoring_system epss
scoring_elements 0.77899
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120901
9
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120902
10
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120903
11
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120905
12
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120906
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
reference_id 2314697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
14
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214104
19
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214106
20
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214108
21
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
22
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
23
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
24
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
25
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
26
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
27
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
28
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27808
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk
1
url VCID-3daw-8nh6-dfcq
vulnerability_id VCID-3daw-8nh6-dfcq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.1148
published_at 2026-04-13T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11549
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11603
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11392
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11476
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11535
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11545
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11511
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
reference_id 2323263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-44185
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq
2
url VCID-dxsm-nf4f-yfe4
vulnerability_id VCID-dxsm-nf4f-yfe4
summary webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
reference_id
reference_type
scores
0
value 0.01223
scoring_system epss
scoring_elements 0.79105
published_at 2026-04-13T12:55:00Z
1
value 0.01223
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-04T12:55:00Z
2
value 0.01223
scoring_system epss
scoring_elements 0.79072
published_at 2026-04-07T12:55:00Z
3
value 0.01223
scoring_system epss
scoring_elements 0.79097
published_at 2026-04-08T12:55:00Z
4
value 0.01223
scoring_system epss
scoring_elements 0.79104
published_at 2026-04-09T12:55:00Z
5
value 0.01223
scoring_system epss
scoring_elements 0.79128
published_at 2026-04-11T12:55:00Z
6
value 0.01223
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-12T12:55:00Z
7
value 0.01652
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120905
11
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120906
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
reference_id 2314700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
13
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
14
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214100
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214108
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27833
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4
3
url VCID-n7w5-dz8n-mbht
vulnerability_id VCID-n7w5-dz8n-mbht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-02T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51302
published_at 2026-04-04T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51262
published_at 2026-04-07T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-08T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51314
published_at 2026-04-09T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51357
published_at 2026-04-11T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121569
9
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121571
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
reference_id 2323278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
aliases CVE-2024-44244
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht
4
url VCID-ya13-9pc8-n3ht
vulnerability_id VCID-ya13-9pc8-n3ht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-13T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69723
published_at 2026-04-11T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69709
published_at 2026-04-12T12:55:00Z
3
value 0.00623
scoring_system epss
scoring_elements 0.70076
published_at 2026-04-02T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.70137
published_at 2026-04-04T12:55:00Z
5
value 0.00625
scoring_system epss
scoring_elements 0.70178
published_at 2026-04-09T12:55:00Z
6
value 0.00625
scoring_system epss
scoring_elements 0.70162
published_at 2026-04-08T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.70115
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/118479
reference_id 118479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/118479
8
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120304
9
reference_url https://support.apple.com/en-us/120305
reference_id 120305
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120305
10
reference_url https://support.apple.com/en-us/120307
reference_id 120307
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120307
11
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120309
12
reference_url https://support.apple.com/en-us/120310
reference_id 120310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120310
13
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120311
14
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120339
15
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/126632
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
reference_id 2259893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
17
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
18
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
19
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/6631-1/
reference_id USN-6631-1
reference_type
scores
url https://usn.ubuntu.com/6631-1/
fixed_packages
aliases CVE-2024-23222
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ya13-9pc8-n3ht
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.46.3-1%3Farch=el9_2