Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
Typedeb
Namespacedebian
Namewpewebkit
Version2.44.2-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.44.3-1
Latest_non_vulnerable_version2.52.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1e6d-p4fv-rubk
vulnerability_id VCID-1e6d-p4fv-rubk
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
reference_id
reference_type
scores
0
value 0.00822
scoring_system epss
scoring_elements 0.7442
published_at 2026-04-13T12:55:00Z
1
value 0.00822
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-04T12:55:00Z
2
value 0.00822
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-07T12:55:00Z
3
value 0.00822
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-08T12:55:00Z
4
value 0.00822
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-09T12:55:00Z
5
value 0.00822
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-11T12:55:00Z
6
value 0.00822
scoring_system epss
scoring_elements 0.74429
published_at 2026-04-12T12:55:00Z
7
value 0.01092
scoring_system epss
scoring_elements 0.77899
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120901
9
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120902
10
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120903
11
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120905
12
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120906
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
reference_id 2314697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
14
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214104
19
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214106
20
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214108
21
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
22
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
23
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
24
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
25
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
26
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
27
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
28
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-27808
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk
1
url VCID-6xkn-7q6s-5fey
vulnerability_id VCID-6xkn-7q6s-5fey
summary webkit: pointer authentication bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00773
published_at 2026-04-13T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00772
published_at 2026-04-12T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00701
published_at 2026-04-07T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00778
published_at 2026-04-11T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00784
published_at 2026-04-09T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00788
published_at 2026-04-08T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00697
published_at 2026-04-04T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00702
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/05/21/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://www.openwall.com/lists/oss-security/2024/05/21/1
8
reference_url http://seclists.org/fulldisclosure/2024/May/10
reference_id 10
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/10
9
reference_url http://seclists.org/fulldisclosure/2024/May/12
reference_id 12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/12
10
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120896
11
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120898
12
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120901
13
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120902
14
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120903
15
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120905
16
reference_url http://seclists.org/fulldisclosure/2024/May/16
reference_id 16
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/16
17
reference_url http://seclists.org/fulldisclosure/2024/May/17
reference_id 17
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/17
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
reference_id 2282412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
19
reference_url http://seclists.org/fulldisclosure/2024/May/9
reference_id 9
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/9
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
reference_id ADCLQW54XN37VJZNYD3UKCYATJFIMYXG
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
21
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214101
22
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214102
23
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214103
24
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214104
25
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214106
26
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
27
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
28
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
30
reference_url https://usn.ubuntu.com/6788-1/
reference_id USN-6788-1
reference_type
scores
url https://usn.ubuntu.com/6788-1/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
reference_id WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-27834
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkn-7q6s-5fey
2
url VCID-dxsm-nf4f-yfe4
vulnerability_id VCID-dxsm-nf4f-yfe4
summary webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
reference_id
reference_type
scores
0
value 0.01223
scoring_system epss
scoring_elements 0.79105
published_at 2026-04-13T12:55:00Z
1
value 0.01223
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-04T12:55:00Z
2
value 0.01223
scoring_system epss
scoring_elements 0.79072
published_at 2026-04-07T12:55:00Z
3
value 0.01223
scoring_system epss
scoring_elements 0.79097
published_at 2026-04-08T12:55:00Z
4
value 0.01223
scoring_system epss
scoring_elements 0.79104
published_at 2026-04-09T12:55:00Z
5
value 0.01223
scoring_system epss
scoring_elements 0.79128
published_at 2026-04-11T12:55:00Z
6
value 0.01223
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-12T12:55:00Z
7
value 0.01652
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120905
11
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120906
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
reference_id 2314700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
13
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
14
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214100
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214108
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-27833
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4
3
url VCID-v1he-6exf-b7dt
vulnerability_id VCID-v1he-6exf-b7dt
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27820
reference_id
reference_type
scores
0
value 0.01283
scoring_system epss
scoring_elements 0.79595
published_at 2026-04-13T12:55:00Z
1
value 0.01283
scoring_system epss
scoring_elements 0.79574
published_at 2026-04-04T12:55:00Z
2
value 0.01283
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-07T12:55:00Z
3
value 0.01283
scoring_system epss
scoring_elements 0.7959
published_at 2026-04-08T12:55:00Z
4
value 0.01283
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-09T12:55:00Z
5
value 0.01283
scoring_system epss
scoring_elements 0.79618
published_at 2026-04-11T12:55:00Z
6
value 0.01283
scoring_system epss
scoring_elements 0.79603
published_at 2026-04-12T12:55:00Z
7
value 0.01303
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120902
11
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120903
12
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120905
13
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120906
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314698
reference_id 2314698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314698
15
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
16
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214100
17
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214101
18
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214102
19
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214103
20
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214104
21
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214106
22
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214108
23
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
24
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
25
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
26
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
27
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
28
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
29
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
30
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
31
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.44.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-27820
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v1he-6exf-b7dt
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.44.2-1%3Fdistro=trixie