Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
Typedeb
Namespacedebian
Namewpewebkit
Version2.46.5-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.46.6-1
Latest_non_vulnerable_version2.52.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2vtf-gudd-9fah
vulnerability_id VCID-2vtf-gudd-9fah
summary WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71986
published_at 2026-04-13T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71966
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71994
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72001
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
reference_id 2333841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.46.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-54479
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah
1
url VCID-9j6k-np3x-23f7
vulnerability_id VCID-9j6k-np3x-23f7
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
reference_id
reference_type
scores
0
value 0.01383
scoring_system epss
scoring_elements 0.80301
published_at 2026-04-13T12:55:00Z
1
value 0.01383
scoring_system epss
scoring_elements 0.80278
published_at 2026-04-04T12:55:00Z
2
value 0.01383
scoring_system epss
scoring_elements 0.80266
published_at 2026-04-07T12:55:00Z
3
value 0.01383
scoring_system epss
scoring_elements 0.80293
published_at 2026-04-08T12:55:00Z
4
value 0.01383
scoring_system epss
scoring_elements 0.80304
published_at 2026-04-09T12:55:00Z
5
value 0.01383
scoring_system epss
scoring_elements 0.80323
published_at 2026-04-11T12:55:00Z
6
value 0.01383
scoring_system epss
scoring_elements 0.80308
published_at 2026-04-12T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
reference_id 2333845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.46.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-54508
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7
2
url VCID-b3dw-sj5b-5bhr
vulnerability_id VCID-b3dw-sj5b-5bhr
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
reference_id
reference_type
scores
0
value 0.05739
scoring_system epss
scoring_elements 0.9041
published_at 2026-04-02T12:55:00Z
1
value 0.07285
scoring_system epss
scoring_elements 0.9167
published_at 2026-04-12T12:55:00Z
2
value 0.07285
scoring_system epss
scoring_elements 0.91637
published_at 2026-04-04T12:55:00Z
3
value 0.07285
scoring_system epss
scoring_elements 0.91645
published_at 2026-04-07T12:55:00Z
4
value 0.07285
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-08T12:55:00Z
5
value 0.07285
scoring_system epss
scoring_elements 0.91664
published_at 2026-04-09T12:55:00Z
6
value 0.07285
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121846
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
reference_id 2333843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
11
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
12
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
13
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
14
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
15
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
16
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
17
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
18
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
19
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.46.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-54502
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr
3
url VCID-b8ws-1k92-7bhq
vulnerability_id VCID-b8ws-1k92-7bhq
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33157
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-13T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.3473
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34607
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34651
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34683
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
reference_id 2344619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:1957
reference_id RHSA-2025:1957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1957
14
reference_url https://access.redhat.com/errata/RHSA-2025:1958
reference_id RHSA-2025:1958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1958
15
reference_url https://access.redhat.com/errata/RHSA-2025:1959
reference_id RHSA-2025:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1959
16
reference_url https://access.redhat.com/errata/RHSA-2025:1960
reference_id RHSA-2025:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1960
17
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
18
reference_url https://access.redhat.com/errata/RHSA-2025:2035
reference_id RHSA-2025:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2035
19
reference_url https://access.redhat.com/errata/RHSA-2025:2121
reference_id RHSA-2025:2121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2121
20
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
21
reference_url https://access.redhat.com/errata/RHSA-2025:2126
reference_id RHSA-2025:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2126
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.46.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-54543
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq
4
url VCID-kuyh-x3z4-q7gf
vulnerability_id VCID-kuyh-x3z4-q7gf
summary webkit: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
reference_id
reference_type
scores
0
value 0.00587
scoring_system epss
scoring_elements 0.69106
published_at 2026-04-13T12:55:00Z
1
value 0.00587
scoring_system epss
scoring_elements 0.69058
published_at 2026-04-02T12:55:00Z
2
value 0.00587
scoring_system epss
scoring_elements 0.69079
published_at 2026-04-04T12:55:00Z
3
value 0.00587
scoring_system epss
scoring_elements 0.6906
published_at 2026-04-07T12:55:00Z
4
value 0.00587
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-08T12:55:00Z
5
value 0.00587
scoring_system epss
scoring_elements 0.69129
published_at 2026-04-09T12:55:00Z
6
value 0.00587
scoring_system epss
scoring_elements 0.69152
published_at 2026-04-11T12:55:00Z
7
value 0.00587
scoring_system epss
scoring_elements 0.69136
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
reference_id 2333844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.46.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.46.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
aliases CVE-2024-54505
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.46.5-1%3Fdistro=trixie