Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
Typedeb
Namespacedebian
Namewpewebkit
Version2.48.0-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.48.1-1
Latest_non_vulnerable_version2.52.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-23pb-y6g6-sbed
vulnerability_id VCID-23pb-y6g6-sbed
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24189
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75799
published_at 2026-04-02T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75852
published_at 2026-04-13T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75831
published_at 2026-04-04T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.75809
published_at 2026-04-07T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75842
published_at 2026-04-08T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75854
published_at 2026-04-09T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75877
published_at 2026-04-11T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75859
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386267
reference_id 2386267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386267
11
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
12
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
13
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
14
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
15
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
16
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
17
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
18
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
19
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2025-24189
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23pb-y6g6-sbed
1
url VCID-7gyr-mvmk-pfh9
vulnerability_id VCID-7gyr-mvmk-pfh9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40598
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40626
published_at 2026-04-11T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40607
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40547
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-04T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43206
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43221
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
reference_id 2353872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-54467
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9
2
url VCID-azef-hxum-z3eb
vulnerability_id VCID-azef-hxum-z3eb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-04T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23536
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24943
published_at 2026-04-12T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27125
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122281
reference_id 122281
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122281
5
reference_url https://support.apple.com/en-us/122283
reference_id 122283
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122283
6
reference_url https://support.apple.com/en-us/122284
reference_id 122284
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122284
7
reference_url https://support.apple.com/en-us/122285
reference_id 122285
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122285
8
reference_url https://support.apple.com/en-us/122345
reference_id 122345
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122345
9
reference_url https://support.apple.com/en-us/122346
reference_id 122346
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122346
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122372
11
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122376
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
reference_id 2351802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
13
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://access.redhat.com/errata/RHSA-2025:2863
reference_id RHSA-2025:2863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2863
16
reference_url https://access.redhat.com/errata/RHSA-2025:2864
reference_id RHSA-2025:2864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2864
17
reference_url https://access.redhat.com/errata/RHSA-2025:2997
reference_id RHSA-2025:2997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2997
18
reference_url https://access.redhat.com/errata/RHSA-2025:2998
reference_id RHSA-2025:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2998
19
reference_url https://access.redhat.com/errata/RHSA-2025:3000
reference_id RHSA-2025:3000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3000
20
reference_url https://access.redhat.com/errata/RHSA-2025:3001
reference_id RHSA-2025:3001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3001
21
reference_url https://access.redhat.com/errata/RHSA-2025:3002
reference_id RHSA-2025:3002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3002
22
reference_url https://access.redhat.com/errata/RHSA-2025:3005
reference_id RHSA-2025:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3005
23
reference_url https://access.redhat.com/errata/RHSA-2025:3034
reference_id RHSA-2025:3034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3034
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2025-24201
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb
3
url VCID-mch4-qacj-f7ey
vulnerability_id VCID-mch4-qacj-f7ey
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40741
published_at 2026-04-11T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40715
published_at 2026-04-02T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40717
published_at 2026-04-08T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40667
published_at 2026-04-07T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-04T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40723
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43342
published_at 2026-04-13T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43358
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
reference_id 2353871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-44192
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.0-1%3Fdistro=trixie