{"url":"http://public2.vulnerablecode.io/api/packages/94217?format=json","purl":"pkg:rpm/redhat/webkit2gtk3@2.40.5-1?arch=el8","type":"rpm","namespace":"redhat","name":"webkit2gtk3","version":"2.40.5-1","qualifiers":{"arch":"el8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33722?format=json","vulnerability_id":"VCID-2a1d-w9tn-x3h6","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38600","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7113","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/08/02/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/08/02/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231021","reference_id":"2231021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231021"},{"reference_url":"https://www.debian.org/security/2023/dsa-5468","reference_id":"dsa-5468","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://www.debian.org/security/2023/dsa-5468"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213841","reference_id":"HT213841","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213841"},{"reference_url":"https://support.apple.com/en-us/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213843"},{"reference_url":"https://support.apple.com/en-us/HT213846","reference_id":"HT213846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213846"},{"reference_url":"https://support.apple.com/en-us/HT213847","reference_id":"HT213847","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213847"},{"reference_url":"https://support.apple.com/en-us/HT213848","reference_id":"HT213848","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213848"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/","reference_id":"KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/","reference_id":"KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38600"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2a1d-w9tn-x3h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33720?format=json","vulnerability_id":"VCID-3r9c-5ys2-43hw","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38597","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67457","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231043","reference_id":"2231043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231043"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38597"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3r9c-5ys2-43hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47884?format=json","vulnerability_id":"VCID-4kzn-hfnz-3faf","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40451","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50647","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40451"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/2","reference_id":"2","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241409","reference_id":"2241409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241409"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/3","reference_id":"3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/3"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-40451"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzn-hfnz-3faf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33721?format=json","vulnerability_id":"VCID-6uck-ed5x-fyga","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38599","reference_id":"","reference_type":"","scores":[{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67737","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67671","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231020","reference_id":"2231020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231020"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38599"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6uck-ed5x-fyga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33715?format=json","vulnerability_id":"VCID-71d6-g16a-3qa9","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38133","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.6069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60675","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231015","reference_id":"2231015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231015"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38133"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71d6-g16a-3qa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49537?format=json","vulnerability_id":"VCID-85na-58dz-53hb","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27932","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01761","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01755","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236843","reference_id":"2236843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236843"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://support.apple.com/en-us/HT213671","reference_id":"HT213671","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213671"},{"reference_url":"https://support.apple.com/en-us/HT213674","reference_id":"HT213674","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213674"},{"reference_url":"https://support.apple.com/en-us/HT213676","reference_id":"HT213676","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213676"},{"reference_url":"https://support.apple.com/en-us/HT213678","reference_id":"HT213678","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/"}],"url":"https://support.apple.com/en-us/HT213678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2023-27932"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-85na-58dz-53hb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33710?format=json","vulnerability_id":"VCID-a35x-vamv-zyez","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32370","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/11/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/11/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238944","reference_id":"2238944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238944"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-32370"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a35x-vamv-zyez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77960?format=json","vulnerability_id":"VCID-f4xf-wrqj-mqbj","summary":"webkitgtk: A website may able to track visited websites in private browsing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32933","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43384","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43375","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271441","reference_id":"2271441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-32933"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f4xf-wrqj-mqbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33712?format=json","vulnerability_id":"VCID-g4ct-k4dv-s7fs","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32393","reference_id":"","reference_type":"","scores":[{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.4681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46829","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46827","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46834","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224608","reference_id":"2224608","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224608"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[],"aliases":["CVE-2023-32393"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g4ct-k4dv-s7fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33708?format=json","vulnerability_id":"VCID-kbr6-94t1-87hd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28198","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17233","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17288","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238943","reference_id":"2238943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238943"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-28198"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbr6-94t1-87hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33717?format=json","vulnerability_id":"VCID-kj7n-3mny-wkgr","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38592","reference_id":"","reference_type":"","scores":[{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72561","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231017","reference_id":"2231017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231017"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38592"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kj7n-3mny-wkgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77962?format=json","vulnerability_id":"VCID-mepa-3qeb-1fd6","summary":"webkitgtk: Visiting a malicious website may lead to address bar spoofing.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46725","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18367","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18168","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271446","reference_id":"2271446","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-46725"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mepa-3qeb-1fd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77959?format=json","vulnerability_id":"VCID-mfvu-9zv4-k3gq","summary":"webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32919","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21718","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21831","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271437","reference_id":"2271437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271437"},{"reference_url":"https://support.apple.com/en-us/HT213530","reference_id":"HT213530","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/"}],"url":"https://support.apple.com/en-us/HT213530"},{"reference_url":"https://support.apple.com/en-us/HT213532","reference_id":"HT213532","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/"}],"url":"https://support.apple.com/en-us/HT213532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-32919"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfvu-9zv4-k3gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77961?format=json","vulnerability_id":"VCID-mjg1-q19v-gkcy","summary":"webkitgtk: Visiting a malicious website may lead to address bar spoofing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46705","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33674","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33554","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271444","reference_id":"2271444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-46705"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjg1-q19v-gkcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33723?format=json","vulnerability_id":"VCID-n7a4-nphm-ufam","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38611","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7113","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231022","reference_id":"2231022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231022"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38611"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7a4-nphm-ufam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33716?format=json","vulnerability_id":"VCID-r8td-qqvp-xbbd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38572","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67248","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231028","reference_id":"2231028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231028"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38572"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8td-qqvp-xbbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41964?format=json","vulnerability_id":"VCID-rspt-fzz1-vudp","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42833","reference_id":"","reference_type":"","scores":[{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6964","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69657","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69664","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270146","reference_id":"2270146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270146"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT213938","reference_id":"HT213938","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"https://support.apple.com/en-us/HT213938"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-42833"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rspt-fzz1-vudp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49511?format=json","vulnerability_id":"VCID-shfm-129h-47ha","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32885","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40784","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4075","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236842","reference_id":"2236842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236842"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32885"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shfm-129h-47ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33718?format=json","vulnerability_id":"VCID-vt3f-hrb1-33cw","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38594","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63069","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67011","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231018","reference_id":"2231018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231018"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38594"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3f-hrb1-33cw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33719?format=json","vulnerability_id":"VCID-vwaa-vyn9-d3ey","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38595","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76836","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76847","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231019","reference_id":"2231019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231019"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[],"aliases":["CVE-2023-38595"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwaa-vyn9-d3ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33724?format=json","vulnerability_id":"VCID-xqyu-yhx3-f7fq","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397","reference_id":"","reference_type":"","scores":[{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78875","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945","reference_id":"2238945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-40397"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqyu-yhx3-f7fq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49538?format=json","vulnerability_id":"VCID-ygd8-6k3t-quck","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27954","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40743","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236844","reference_id":"2236844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236844"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://support.apple.com/en-us/HT213671","reference_id":"HT213671","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213671"},{"reference_url":"https://support.apple.com/en-us/HT213673","reference_id":"HT213673","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213673"},{"reference_url":"https://support.apple.com/en-us/HT213674","reference_id":"HT213674","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213674"},{"reference_url":"https://support.apple.com/en-us/HT213676","reference_id":"HT213676","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213676"},{"reference_url":"https://support.apple.com/en-us/HT213678","reference_id":"HT213678","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/"}],"url":"https://support.apple.com/en-us/HT213678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2023-27954"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygd8-6k3t-quck"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.40.5-1%3Farch=el8"}