Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
Typedeb
Namespacedebian
Namewpewebkit
Version2.44.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.44.2-1
Latest_non_vulnerable_version2.52.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-455j-vpxx-yudd
vulnerability_id VCID-455j-vpxx-yudd
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23284
reference_id
reference_type
scores
0
value 0.00881
scoring_system epss
scoring_elements 0.75325
published_at 2026-04-02T12:55:00Z
1
value 0.00884
scoring_system epss
scoring_elements 0.7543
published_at 2026-04-12T12:55:00Z
2
value 0.00884
scoring_system epss
scoring_elements 0.75452
published_at 2026-04-11T12:55:00Z
3
value 0.00884
scoring_system epss
scoring_elements 0.75432
published_at 2026-04-09T12:55:00Z
4
value 0.00884
scoring_system epss
scoring_elements 0.75423
published_at 2026-04-08T12:55:00Z
5
value 0.00884
scoring_system epss
scoring_elements 0.7538
published_at 2026-04-07T12:55:00Z
6
value 0.00884
scoring_system epss
scoring_elements 0.754
published_at 2026-04-04T12:55:00Z
7
value 0.00884
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23284
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120880
reference_id 120880
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120880
14
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120881
15
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120882
16
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120883
17
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120893
18
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120894
19
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120895
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270292
reference_id 2270292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270292
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
24
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
27
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
28
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214081
29
reference_url https://support.apple.com/en-us/HT214082
reference_id HT214082
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214082
30
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214084
31
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214086
32
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214087
33
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214088
34
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214089
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
37
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
38
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
39
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
40
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-23284
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-455j-vpxx-yudd
1
url VCID-53ct-99rf-sydt
vulnerability_id VCID-53ct-99rf-sydt
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42843
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19868
published_at 2026-04-02T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26538
published_at 2026-04-04T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26908
published_at 2026-04-08T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27689
published_at 2026-04-13T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.2779
published_at 2026-04-11T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27748
published_at 2026-04-12T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32648
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271717
reference_id 2271717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271717
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT213981
reference_id HT213981
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213981
16
reference_url https://support.apple.com/en-us/HT213982
reference_id HT213982
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213982
17
reference_url https://support.apple.com/en-us/HT213984
reference_id HT213984
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213984
18
reference_url https://support.apple.com/en-us/HT213986
reference_id HT213986
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213986
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
20
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2023-42843
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53ct-99rf-sydt
2
url VCID-8ncw-zt4k-73ak
vulnerability_id VCID-8ncw-zt4k-73ak
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42956
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.5347
published_at 2026-04-02T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53526
published_at 2026-04-13T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53495
published_at 2026-04-04T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53464
published_at 2026-04-07T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.53515
published_at 2026-04-08T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53512
published_at 2026-04-09T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53561
published_at 2026-04-11T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53544
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271719
reference_id 2271719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271719
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
20
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2023-42956
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ncw-zt4k-73ak
3
url VCID-8utu-penp-rbax
vulnerability_id VCID-8utu-penp-rbax
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23280
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.665
published_at 2026-04-02T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66637
published_at 2026-04-12T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.6665
published_at 2026-04-11T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66631
published_at 2026-04-09T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.6657
published_at 2026-04-07T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66598
published_at 2026-04-04T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66617
published_at 2026-04-08T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66605
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120881
14
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120882
15
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120893
16
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120894
17
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120895
18
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270291
reference_id 2270291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270291
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
21
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
24
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
25
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214081
26
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214084
27
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214086
28
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214088
29
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214089
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
32
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
33
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-23280
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8utu-penp-rbax
4
url VCID-g2uh-tzx9-bqc7
vulnerability_id VCID-g2uh-tzx9-bqc7
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39859
published_at 2026-04-02T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39882
published_at 2026-04-04T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-08T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-07T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.4428
published_at 2026-04-13T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44295
published_at 2026-04-09T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44313
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120881
13
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120882
14
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120883
15
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120893
16
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120894
17
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120895
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
reference_id 2344946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-54658
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2uh-tzx9-bqc7
5
url VCID-gn1n-fjzp-hqe2
vulnerability_id VCID-gn1n-fjzp-hqe2
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43010
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.1427
published_at 2026-04-12T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14354
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14309
published_at 2026-04-11T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14362
published_at 2026-04-09T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14308
published_at 2026-04-08T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-04T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14225
published_at 2026-04-07T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15601
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://support.apple.com/en-us/120300
reference_id 120300
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120300
13
reference_url https://support.apple.com/en-us/120877
reference_id 120877
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120877
14
reference_url https://support.apple.com/en-us/120879
reference_id 120879
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120879
15
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/126632
16
reference_url https://support.apple.com/en-us/126646
reference_id 126646
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/126646
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448778
reference_id 2448778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448778
18
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
22
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2023-43010
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gn1n-fjzp-hqe2
6
url VCID-h7uu-gj11-a3er
vulnerability_id VCID-h7uu-gj11-a3er
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23263
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69912
published_at 2026-04-02T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.70044
published_at 2026-04-12T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.7006
published_at 2026-04-11T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70036
published_at 2026-04-09T12:55:00Z
4
value 0.0062
scoring_system epss
scoring_elements 0.7002
published_at 2026-04-08T12:55:00Z
5
value 0.0062
scoring_system epss
scoring_elements 0.69996
published_at 2026-04-04T12:55:00Z
6
value 0.0062
scoring_system epss
scoring_elements 0.69972
published_at 2026-04-07T12:55:00Z
7
value 0.0062
scoring_system epss
scoring_elements 0.70031
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23263
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120880
reference_id 120880
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120880
14
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120881
15
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120882
16
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120883
17
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120893
18
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120894
19
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120895
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270290
reference_id 2270290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270290
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
24
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
27
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
28
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214081
29
reference_url https://support.apple.com/en-us/HT214082
reference_id HT214082
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214082
30
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214084
31
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214086
32
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214087
33
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214088
34
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214089
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
37
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
38
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
39
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
40
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-23263
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7uu-gj11-a3er
7
url VCID-mu71-qcsx-33fj
vulnerability_id VCID-mu71-qcsx-33fj
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42950
reference_id
reference_type
scores
0
value 0.00645
scoring_system epss
scoring_elements 0.70623
published_at 2026-04-02T12:55:00Z
1
value 0.00645
scoring_system epss
scoring_elements 0.70672
published_at 2026-04-13T12:55:00Z
2
value 0.00645
scoring_system epss
scoring_elements 0.70639
published_at 2026-04-04T12:55:00Z
3
value 0.00645
scoring_system epss
scoring_elements 0.70616
published_at 2026-04-07T12:55:00Z
4
value 0.00645
scoring_system epss
scoring_elements 0.70661
published_at 2026-04-08T12:55:00Z
5
value 0.00645
scoring_system epss
scoring_elements 0.70677
published_at 2026-04-09T12:55:00Z
6
value 0.00645
scoring_system epss
scoring_elements 0.707
published_at 2026-04-11T12:55:00Z
7
value 0.00645
scoring_system epss
scoring_elements 0.70685
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271718
reference_id 2271718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271718
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214040
20
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214041
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
22
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
23
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2023-42950
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mu71-qcsx-33fj
8
url VCID-vqd7-gwyv-vfaf
vulnerability_id VCID-vqd7-gwyv-vfaf
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23254
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64466
published_at 2026-04-13T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64494
published_at 2026-04-12T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64506
published_at 2026-04-11T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6449
published_at 2026-04-09T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64474
published_at 2026-04-08T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64426
published_at 2026-04-07T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64467
published_at 2026-04-04T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66263
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23254
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120881
14
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120882
15
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120883
16
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120893
17
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120894
18
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120895
19
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270289
reference_id 2270289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270289
21
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
24
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
25
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214081
26
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214084
27
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214086
28
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214087
29
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214088
30
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214089
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
32
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
33
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-23254
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqd7-gwyv-vfaf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.1-1%3Fdistro=trixie