Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/webkit2gtk3@2.40.5-1?arch=el8
Typerpm
Namespaceredhat
Namewebkit2gtk3
Version2.40.5-1
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2a1d-w9tn-x3h6
vulnerability_id VCID-2a1d-w9tn-x3h6
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38600
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71155
published_at 2026-04-04T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71138
published_at 2026-04-02T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-09T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-08T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.7113
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url http://www.openwall.com/lists/oss-security/2023/08/02/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url http://www.openwall.com/lists/oss-security/2023/08/02/1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231021
reference_id 2231021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231021
16
reference_url https://www.debian.org/security/2023/dsa-5468
reference_id dsa-5468
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://www.debian.org/security/2023/dsa-5468
17
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://security.gentoo.org/glsa/202401-04
18
reference_url https://support.apple.com/en-us/HT213841
reference_id HT213841
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213841
19
reference_url https://support.apple.com/en-us/HT213843
reference_id HT213843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213843
20
reference_url https://support.apple.com/en-us/HT213846
reference_id HT213846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213846
21
reference_url https://support.apple.com/en-us/HT213847
reference_id HT213847
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213847
22
reference_url https://support.apple.com/en-us/HT213848
reference_id HT213848
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213848
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
reference_id KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
reference_id KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
25
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
26
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38600
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a1d-w9tn-x3h6
1
url VCID-3r9c-5ys2-43hw
vulnerability_id VCID-3r9c-5ys2-43hw
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38597
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55836
published_at 2026-04-13T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55875
published_at 2026-04-11T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55855
published_at 2026-04-12T12:55:00Z
3
value 0.00536
scoring_system epss
scoring_elements 0.67436
published_at 2026-04-07T12:55:00Z
4
value 0.00536
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-08T12:55:00Z
5
value 0.00536
scoring_system epss
scoring_elements 0.67502
published_at 2026-04-09T12:55:00Z
6
value 0.00536
scoring_system epss
scoring_elements 0.67435
published_at 2026-04-02T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67457
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231043
reference_id 2231043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231043
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38597
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3r9c-5ys2-43hw
2
url VCID-4kzn-hfnz-3faf
vulnerability_id VCID-4kzn-hfnz-3faf
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40451
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.5062
published_at 2026-04-02T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50658
published_at 2026-04-13T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50602
published_at 2026-04-07T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50657
published_at 2026-04-08T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50653
published_at 2026-04-09T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50695
published_at 2026-04-11T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50673
published_at 2026-04-12T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50647
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40451
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://seclists.org/fulldisclosure/2023/Oct/2
reference_id 2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url http://seclists.org/fulldisclosure/2023/Oct/2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241409
reference_id 2241409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241409
17
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/3
18
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url https://security.gentoo.org/glsa/202401-33
19
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url https://support.apple.com/en-us/HT213941
20
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
21
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-40451
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzn-hfnz-3faf
3
url VCID-6uck-ed5x-fyga
vulnerability_id VCID-6uck-ed5x-fyga
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38599
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62864
published_at 2026-04-13T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62897
published_at 2026-04-11T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62886
published_at 2026-04-12T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67723
published_at 2026-04-08T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67737
published_at 2026-04-09T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.6767
published_at 2026-04-02T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67691
published_at 2026-04-04T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67671
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231020
reference_id 2231020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231020
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38599
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uck-ed5x-fyga
4
url VCID-71d6-g16a-3qa9
vulnerability_id VCID-71d6-g16a-3qa9
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38133
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56109
published_at 2026-04-02T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56129
published_at 2026-04-04T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56108
published_at 2026-04-07T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56159
published_at 2026-04-08T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56164
published_at 2026-04-09T12:55:00Z
5
value 0.00399
scoring_system epss
scoring_elements 0.60655
published_at 2026-04-13T12:55:00Z
6
value 0.00399
scoring_system epss
scoring_elements 0.6069
published_at 2026-04-11T12:55:00Z
7
value 0.00399
scoring_system epss
scoring_elements 0.60675
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231015
reference_id 2231015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231015
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38133
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71d6-g16a-3qa9
5
url VCID-85na-58dz-53hb
vulnerability_id VCID-85na-58dz-53hb
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27932
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01744
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01753
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01758
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01761
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0177
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01765
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01755
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236843
reference_id 2236843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236843
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213670
16
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213671
17
reference_url https://support.apple.com/en-us/HT213674
reference_id HT213674
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213674
18
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213676
19
reference_url https://support.apple.com/en-us/HT213678
reference_id HT213678
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213678
20
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
21
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2023-27932
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85na-58dz-53hb
6
url VCID-a35x-vamv-zyez
vulnerability_id VCID-a35x-vamv-zyez
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32370
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08134
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08164
published_at 2026-04-13T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08192
published_at 2026-04-08T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0821
published_at 2026-04-09T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08201
published_at 2026-04-11T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08181
published_at 2026-04-12T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08177
published_at 2026-04-04T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://www.openwall.com/lists/oss-security/2023/09/11/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url http://www.openwall.com/lists/oss-security/2023/09/11/1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238944
reference_id 2238944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238944
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url https://support.apple.com/en-us/HT213670
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-32370
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a35x-vamv-zyez
7
url VCID-f4xf-wrqj-mqbj
vulnerability_id VCID-f4xf-wrqj-mqbj
summary webkitgtk: A website may able to track visited websites in private browsing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32933
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43357
published_at 2026-04-02T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43362
published_at 2026-04-13T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.4339
published_at 2026-04-09T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43409
published_at 2026-04-11T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43377
published_at 2026-04-12T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43384
published_at 2026-04-04T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43323
published_at 2026-04-07T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43375
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271441
reference_id 2271441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271441
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-32933
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4xf-wrqj-mqbj
8
url VCID-g4ct-k4dv-s7fs
vulnerability_id VCID-g4ct-k4dv-s7fs
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32393
reference_id
reference_type
scores
0
value 0.00237
scoring_system epss
scoring_elements 0.4681
published_at 2026-04-02T12:55:00Z
1
value 0.00237
scoring_system epss
scoring_elements 0.46829
published_at 2026-04-04T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.46778
published_at 2026-04-07T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.46833
published_at 2026-04-08T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46832
published_at 2026-04-09T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.46855
published_at 2026-04-11T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.46827
published_at 2026-04-12T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46834
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224608
reference_id 2224608
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224608
14
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
15
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
16
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-32393
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4ct-k4dv-s7fs
9
url VCID-kbr6-94t1-87hd
vulnerability_id VCID-kbr6-94t1-87hd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17404
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17451
published_at 2026-04-04T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17233
published_at 2026-04-07T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17325
published_at 2026-04-08T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17384
published_at 2026-04-09T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17396
published_at 2026-04-11T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17346
published_at 2026-04-12T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17288
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
reference_id 2238943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
14
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-28198
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbr6-94t1-87hd
10
url VCID-kj7n-3mny-wkgr
vulnerability_id VCID-kj7n-3mny-wkgr
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38592
reference_id
reference_type
scores
0
value 0.00583
scoring_system epss
scoring_elements 0.68968
published_at 2026-04-13T12:55:00Z
1
value 0.00583
scoring_system epss
scoring_elements 0.69012
published_at 2026-04-11T12:55:00Z
2
value 0.00583
scoring_system epss
scoring_elements 0.68998
published_at 2026-04-12T12:55:00Z
3
value 0.00727
scoring_system epss
scoring_elements 0.72599
published_at 2026-04-08T12:55:00Z
4
value 0.00727
scoring_system epss
scoring_elements 0.72611
published_at 2026-04-09T12:55:00Z
5
value 0.00727
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-02T12:55:00Z
6
value 0.00727
scoring_system epss
scoring_elements 0.72585
published_at 2026-04-04T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72561
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38592
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231017
reference_id 2231017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231017
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38592
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kj7n-3mny-wkgr
11
url VCID-mepa-3qeb-1fd6
vulnerability_id VCID-mepa-3qeb-1fd6
summary webkitgtk: Visiting a malicious website may lead to address bar spoofing.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46725
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18367
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18422
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.1821
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18264
published_at 2026-04-09T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18266
published_at 2026-04-11T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18219
published_at 2026-04-12T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18168
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271446
reference_id 2271446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271446
10
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
11
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-46725
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mepa-3qeb-1fd6
12
url VCID-mfvu-9zv4-k3gq
vulnerability_id VCID-mfvu-9zv4-k3gq
summary webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32919
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21778
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21634
published_at 2026-04-13T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21584
published_at 2026-04-07T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21661
published_at 2026-04-08T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21718
published_at 2026-04-09T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.2173
published_at 2026-04-11T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21691
published_at 2026-04-12T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21831
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271437
reference_id 2271437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271437
10
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/
url https://support.apple.com/en-us/HT213530
11
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/
url https://support.apple.com/en-us/HT213532
12
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
13
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-32919
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfvu-9zv4-k3gq
13
url VCID-mjg1-q19v-gkcy
vulnerability_id VCID-mjg1-q19v-gkcy
summary webkitgtk: Visiting a malicious website may lead to address bar spoofing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46705
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33674
published_at 2026-04-02T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33707
published_at 2026-04-04T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33545
published_at 2026-04-07T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33589
published_at 2026-04-08T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33623
published_at 2026-04-09T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33618
published_at 2026-04-11T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33577
published_at 2026-04-12T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33554
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46705
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271444
reference_id 2271444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271444
10
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
11
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-46705
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjg1-q19v-gkcy
14
url VCID-n7a4-nphm-ufam
vulnerability_id VCID-n7a4-nphm-ufam
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38611
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-08T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-09T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71138
published_at 2026-04-02T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71155
published_at 2026-04-04T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.7113
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231022
reference_id 2231022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231022
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38611
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7a4-nphm-ufam
15
url VCID-r8td-qqvp-xbbd
vulnerability_id VCID-r8td-qqvp-xbbd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38572
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61626
published_at 2026-04-13T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61657
published_at 2026-04-11T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61646
published_at 2026-04-12T12:55:00Z
3
value 0.00532
scoring_system epss
scoring_elements 0.673
published_at 2026-04-08T12:55:00Z
4
value 0.00532
scoring_system epss
scoring_elements 0.67313
published_at 2026-04-09T12:55:00Z
5
value 0.00532
scoring_system epss
scoring_elements 0.67246
published_at 2026-04-02T12:55:00Z
6
value 0.00532
scoring_system epss
scoring_elements 0.67271
published_at 2026-04-04T12:55:00Z
7
value 0.00532
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231028
reference_id 2231028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231028
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38572
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8td-qqvp-xbbd
16
url VCID-rspt-fzz1-vudp
vulnerability_id VCID-rspt-fzz1-vudp
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42833
reference_id
reference_type
scores
0
value 0.00606
scoring_system epss
scoring_elements 0.69649
published_at 2026-04-13T12:55:00Z
1
value 0.00606
scoring_system epss
scoring_elements 0.69595
published_at 2026-04-02T12:55:00Z
2
value 0.00606
scoring_system epss
scoring_elements 0.69611
published_at 2026-04-04T12:55:00Z
3
value 0.00606
scoring_system epss
scoring_elements 0.69589
published_at 2026-04-07T12:55:00Z
4
value 0.00606
scoring_system epss
scoring_elements 0.6964
published_at 2026-04-08T12:55:00Z
5
value 0.00606
scoring_system epss
scoring_elements 0.69657
published_at 2026-04-09T12:55:00Z
6
value 0.00606
scoring_system epss
scoring_elements 0.69679
published_at 2026-04-11T12:55:00Z
7
value 0.00606
scoring_system epss
scoring_elements 0.69664
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270146
reference_id 2270146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270146
16
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
17
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
18
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url https://support.apple.com/en-us/HT213938
19
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url https://support.apple.com/en-us/HT213940
20
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url https://support.apple.com/en-us/HT213941
21
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
22
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42833
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rspt-fzz1-vudp
17
url VCID-shfm-129h-47ha
vulnerability_id VCID-shfm-129h-47ha
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40756
published_at 2026-04-02T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40731
published_at 2026-04-13T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40784
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40708
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40758
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
reference_id 2236842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213341
reference_id HT213341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213341
15
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213346
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2022-32885
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shfm-129h-47ha
18
url VCID-vt3f-hrb1-33cw
vulnerability_id VCID-vt3f-hrb1-33cw
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63041
published_at 2026-04-02T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63069
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63084
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63101
published_at 2026-04-09T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.6698
published_at 2026-04-13T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.67025
published_at 2026-04-11T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67011
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
reference_id 2231018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
18
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
19
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
20
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38594
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3f-hrb1-33cw
19
url VCID-vwaa-vyn9-d3ey
vulnerability_id VCID-vwaa-vyn9-d3ey
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00992
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-08T12:55:00Z
4
value 0.00992
scoring_system epss
scoring_elements 0.76889
published_at 2026-04-09T12:55:00Z
5
value 0.00992
scoring_system epss
scoring_elements 0.76836
published_at 2026-04-02T12:55:00Z
6
value 0.00992
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-04T12:55:00Z
7
value 0.00992
scoring_system epss
scoring_elements 0.76847
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
reference_id 2231019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38595
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwaa-vyn9-d3ey
20
url VCID-xqyu-yhx3-f7fq
vulnerability_id VCID-xqyu-yhx3-f7fq
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40397
reference_id
reference_type
scores
0
value 0.01195
scoring_system epss
scoring_elements 0.78835
published_at 2026-04-02T12:55:00Z
1
value 0.01195
scoring_system epss
scoring_elements 0.78864
published_at 2026-04-04T12:55:00Z
2
value 0.01195
scoring_system epss
scoring_elements 0.78846
published_at 2026-04-07T12:55:00Z
3
value 0.01195
scoring_system epss
scoring_elements 0.78871
published_at 2026-04-08T12:55:00Z
4
value 0.01195
scoring_system epss
scoring_elements 0.78877
published_at 2026-04-09T12:55:00Z
5
value 0.01195
scoring_system epss
scoring_elements 0.78901
published_at 2026-04-11T12:55:00Z
6
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78875
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40397
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238945
reference_id 2238945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238945
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-40397
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqyu-yhx3-f7fq
21
url VCID-ygd8-6k3t-quck
vulnerability_id VCID-ygd8-6k3t-quck
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27954
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-02T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40725
published_at 2026-04-13T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40778
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40702
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40752
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40759
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236844
reference_id 2236844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236844
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213670
16
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213671
17
reference_url https://support.apple.com/en-us/HT213673
reference_id HT213673
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213673
18
reference_url https://support.apple.com/en-us/HT213674
reference_id HT213674
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213674
19
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213676
20
reference_url https://support.apple.com/en-us/HT213678
reference_id HT213678
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213678
21
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
22
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2023-27954
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygd8-6k3t-quck
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.40.5-1%3Farch=el8