Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/webkit2gtk3@2.38.5-1?arch=el9
Typerpm
Namespaceredhat
Namewebkit2gtk3
Version2.38.5-1
Qualifiers
arch el9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1v5n-s4cf-dkat
vulnerability_id VCID-1v5n-s4cf-dkat
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25361.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25361
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44039
published_at 2026-04-13T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44088
published_at 2026-04-11T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.44019
published_at 2026-04-07T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-08T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44072
published_at 2026-04-09T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44055
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175103
reference_id 2175103
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175103
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=244249
reference_id show_bug.cgi?id=244249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/
url https://bugs.webkit.org/show_bug.cgi?id=244249
fixed_packages
aliases CVE-2023-25361
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1v5n-s4cf-dkat
1
url VCID-2dzh-7e8h-rbac
vulnerability_id VCID-2dzh-7e8h-rbac
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25362.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25362
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44039
published_at 2026-04-13T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44019
published_at 2026-04-07T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-08T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.44072
published_at 2026-04-09T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44055
published_at 2026-04-12T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44088
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175105
reference_id 2175105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175105
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=244802
reference_id show_bug.cgi?id=244802
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/
url https://bugs.webkit.org/show_bug.cgi?id=244802
fixed_packages
aliases CVE-2023-25362
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dzh-7e8h-rbac
2
url VCID-4tnr-2yst-m3b8
vulnerability_id VCID-4tnr-2yst-m3b8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46699
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-02T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-13T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.71733
published_at 2026-04-04T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-07T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-08T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71758
published_at 2026-04-09T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71782
published_at 2026-04-11T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156993
reference_id 2156993
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156993
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213532
18
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213535
19
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213536
20
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213537
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46699
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4tnr-2yst-m3b8
3
url VCID-68gk-5ng7-17d9
vulnerability_id VCID-68gk-5ng7-17d9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42867
reference_id
reference_type
scores
0
value 0.05716
scoring_system epss
scoring_elements 0.90392
published_at 2026-04-02T12:55:00Z
1
value 0.05716
scoring_system epss
scoring_elements 0.90436
published_at 2026-04-12T12:55:00Z
2
value 0.05716
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-04T12:55:00Z
3
value 0.05716
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-07T12:55:00Z
4
value 0.05716
scoring_system epss
scoring_elements 0.90422
published_at 2026-04-08T12:55:00Z
5
value 0.05716
scoring_system epss
scoring_elements 0.90429
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42867
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156989
reference_id 2156989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156989
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213530
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-42867
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68gk-5ng7-17d9
4
url VCID-6t3m-f99z-1kf6
vulnerability_id VCID-6t3m-f99z-1kf6
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23518
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54207
published_at 2026-04-02T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54271
published_at 2026-04-13T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54238
published_at 2026-04-04T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54213
published_at 2026-04-07T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-08T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54261
published_at 2026-04-09T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.5431
published_at 2026-04-11T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54292
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167715
reference_id 2167715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167715
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213599
reference_id HT213599
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213599
12
reference_url https://support.apple.com/en-us/HT213600
reference_id HT213600
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213600
13
reference_url https://support.apple.com/en-us/HT213601
reference_id HT213601
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213601
14
reference_url https://support.apple.com/en-us/HT213603
reference_id HT213603
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213603
15
reference_url https://support.apple.com/en-us/HT213604
reference_id HT213604
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213604
16
reference_url https://support.apple.com/en-us/HT213605
reference_id HT213605
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213605
17
reference_url https://support.apple.com/en-us/HT213606
reference_id HT213606
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213606
18
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213638
19
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
20
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
aliases CVE-2023-23518
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6t3m-f99z-1kf6
5
url VCID-6wkv-5av5-gfhy
vulnerability_id VCID-6wkv-5av5-gfhy
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25360.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25360
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43094
published_at 2026-04-02T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43098
published_at 2026-04-13T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43121
published_at 2026-04-04T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43059
published_at 2026-04-07T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43112
published_at 2026-04-08T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43125
published_at 2026-04-09T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43146
published_at 2026-04-11T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43113
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175101
reference_id 2175101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175101
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=242686
reference_id show_bug.cgi?id=242686
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/
url https://bugs.webkit.org/show_bug.cgi?id=242686
fixed_packages
aliases CVE-2023-25360
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wkv-5av5-gfhy
6
url VCID-auzh-b1y3-nkfs
vulnerability_id VCID-auzh-b1y3-nkfs
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25363.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25363
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44039
published_at 2026-04-13T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44019
published_at 2026-04-07T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-08T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.44072
published_at 2026-04-09T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44055
published_at 2026-04-12T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44088
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175107
reference_id 2175107
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175107
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=242684
reference_id show_bug.cgi?id=242684
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/
url https://bugs.webkit.org/show_bug.cgi?id=242684
fixed_packages
aliases CVE-2023-25363
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-auzh-b1y3-nkfs
7
url VCID-bmta-jy4b-mugh
vulnerability_id VCID-bmta-jy4b-mugh
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23517
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43808
published_at 2026-04-02T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43787
published_at 2026-04-13T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43832
published_at 2026-04-04T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43763
published_at 2026-04-07T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.43814
published_at 2026-04-08T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43818
published_at 2026-04-09T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.43836
published_at 2026-04-11T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167717
reference_id 2167717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167717
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213599
reference_id HT213599
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213599
12
reference_url https://support.apple.com/en-us/HT213600
reference_id HT213600
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213600
13
reference_url https://support.apple.com/en-us/HT213601
reference_id HT213601
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213601
14
reference_url https://support.apple.com/en-us/HT213603
reference_id HT213603
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213603
15
reference_url https://support.apple.com/en-us/HT213604
reference_id HT213604
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213604
16
reference_url https://support.apple.com/en-us/HT213605
reference_id HT213605
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213605
17
reference_url https://support.apple.com/en-us/HT213606
reference_id HT213606
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213606
18
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213638
19
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
20
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
aliases CVE-2023-23517
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bmta-jy4b-mugh
8
url VCID-c4mn-f4k4-wqe9
vulnerability_id VCID-c4mn-f4k4-wqe9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32886
reference_id
reference_type
scores
0
value 0.00876
scoring_system epss
scoring_elements 0.75296
published_at 2026-04-13T12:55:00Z
1
value 0.00876
scoring_system epss
scoring_elements 0.75246
published_at 2026-04-02T12:55:00Z
2
value 0.00876
scoring_system epss
scoring_elements 0.75278
published_at 2026-04-04T12:55:00Z
3
value 0.00876
scoring_system epss
scoring_elements 0.75255
published_at 2026-04-07T12:55:00Z
4
value 0.00876
scoring_system epss
scoring_elements 0.75298
published_at 2026-04-08T12:55:00Z
5
value 0.00876
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-09T12:55:00Z
6
value 0.00876
scoring_system epss
scoring_elements 0.75329
published_at 2026-04-11T12:55:00Z
7
value 0.00876
scoring_system epss
scoring_elements 0.75307
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128643
reference_id 2128643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128643
16
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
17
reference_url http://seclists.org/fulldisclosure/2022/Oct/39
reference_id 39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/39
18
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/
reference_id 74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/
20
reference_url https://security.archlinux.org/AVG-2819
reference_id AVG-2819
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2819
21
reference_url https://security.archlinux.org/AVG-2820
reference_id AVG-2820
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2820
22
reference_url https://www.debian.org/security/2022/dsa-5240
reference_id dsa-5240
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://www.debian.org/security/2022/dsa-5240
23
reference_url https://www.debian.org/security/2022/dsa-5241
reference_id dsa-5241
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://www.debian.org/security/2022/dsa-5241
24
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://security.gentoo.org/glsa/202305-32
25
reference_url https://support.apple.com/en-us/HT213442
reference_id HT213442
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213442
26
reference_url https://support.apple.com/en-us/HT213445
reference_id HT213445
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213445
27
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213446
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/
reference_id KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/
29
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html
30
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
31
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
32
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
33
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/
reference_id TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/
34
reference_url https://usn.ubuntu.com/5642-1/
reference_id USN-5642-1
reference_type
scores
url https://usn.ubuntu.com/5642-1/
fixed_packages
aliases CVE-2022-32886
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4mn-f4k4-wqe9
9
url VCID-cc7v-7r6y-nkcp
vulnerability_id VCID-cc7v-7r6y-nkcp
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25358
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.37082
published_at 2026-04-02T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36955
published_at 2026-04-13T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37116
published_at 2026-04-04T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36943
published_at 2026-04-07T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.36994
published_at 2026-04-08T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37007
published_at 2026-04-09T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37016
published_at 2026-04-11T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36981
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25358
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175099
reference_id 2175099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175099
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/
reference_id 5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/
reference_id 6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/
19
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://security.gentoo.org/glsa/202305-32
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/
reference_id KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://bugs.webkit.org/show_bug.cgi?id=242683
reference_id show_bug.cgi?id=242683
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://bugs.webkit.org/show_bug.cgi?id=242683
25
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2023-25358
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc7v-7r6y-nkcp
10
url VCID-cjg6-jkzc-uyg8
vulnerability_id VCID-cjg6-jkzc-uyg8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46700
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-02T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-13T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.71733
published_at 2026-04-04T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-07T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-08T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71758
published_at 2026-04-09T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71782
published_at 2026-04-11T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156994
reference_id 2156994
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156994
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213531
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46700
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjg6-jkzc-uyg8
11
url VCID-dsb1-yxm6-dkcf
vulnerability_id VCID-dsb1-yxm6-dkcf
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42824
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-09T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.0833
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08366
published_at 2026-04-08T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08303
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09601
published_at 2026-04-13T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09648
published_at 2026-04-11T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09617
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140504
reference_id 2140504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140504
8
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
reference_id 5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
reference_id AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
11
reference_url https://www.debian.org/security/2022/dsa-5273
reference_id dsa-5273
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://www.debian.org/security/2022/dsa-5273
12
reference_url https://www.debian.org/security/2022/dsa-5274
reference_id dsa-5274
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://www.debian.org/security/2022/dsa-5274
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213488
15
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213489
16
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213491
17
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213492
18
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213495
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
reference_id JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
20
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-42824
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dsb1-yxm6-dkcf
12
url VCID-e695-3zce-rfay
vulnerability_id VCID-e695-3zce-rfay
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46691
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61159
published_at 2026-04-02T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61205
published_at 2026-04-13T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61187
published_at 2026-04-04T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61153
published_at 2026-04-07T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61201
published_at 2026-04-08T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61216
published_at 2026-04-09T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61236
published_at 2026-04-11T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
8
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156990
reference_id 2156990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156990
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213530
15
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213531
16
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213532
17
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213535
18
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213536
19
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213537
20
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
21
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-46691
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e695-3zce-rfay
13
url VCID-ex1v-8bhw-5yfm
vulnerability_id VCID-ex1v-8bhw-5yfm
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32923
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.46563
published_at 2026-04-04T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46544
published_at 2026-04-02T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46567
published_at 2026-04-09T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46512
published_at 2026-04-07T12:55:00Z
4
value 0.00268
scoring_system epss
scoring_elements 0.50234
published_at 2026-04-13T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50272
published_at 2026-04-11T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.50245
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32923
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140502
reference_id 2140502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140502
16
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213488
19
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213489
20
reference_url https://support.apple.com/en-us/HT213490
reference_id HT213490
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213490
21
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213491
22
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213492
23
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213495
24
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
25
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-32923
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1v-8bhw-5yfm
14
url VCID-fknw-h7xk-gkbt
vulnerability_id VCID-fknw-h7xk-gkbt
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42852
reference_id
reference_type
scores
0
value 0.00846
scoring_system epss
scoring_elements 0.7478
published_at 2026-04-02T12:55:00Z
1
value 0.00846
scoring_system epss
scoring_elements 0.74821
published_at 2026-04-13T12:55:00Z
2
value 0.00846
scoring_system epss
scoring_elements 0.74807
published_at 2026-04-04T12:55:00Z
3
value 0.00846
scoring_system epss
scoring_elements 0.74781
published_at 2026-04-07T12:55:00Z
4
value 0.00846
scoring_system epss
scoring_elements 0.74814
published_at 2026-04-08T12:55:00Z
5
value 0.00846
scoring_system epss
scoring_elements 0.74828
published_at 2026-04-09T12:55:00Z
6
value 0.00846
scoring_system epss
scoring_elements 0.74852
published_at 2026-04-11T12:55:00Z
7
value 0.00846
scoring_system epss
scoring_elements 0.74831
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156986
reference_id 2156986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156986
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213530
18
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213531
19
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213532
20
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213535
21
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213536
22
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213537
23
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
24
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-42852
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fknw-h7xk-gkbt
15
url VCID-hye4-wr18-5fbh
vulnerability_id VCID-hye4-wr18-5fbh
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46692
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02411
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02415
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02422
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0242
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02424
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02445
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156991
reference_id 2156991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156991
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213531
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://support.apple.com/en-us/HT213538
reference_id HT213538
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213538
23
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
24
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46692
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hye4-wr18-5fbh
16
url VCID-knds-dwjv-c3c4
vulnerability_id VCID-knds-dwjv-c3c4
summary webkitgtk: improper bounds checking leading to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48503
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.3691
published_at 2026-04-04T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36879
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39622
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39674
published_at 2026-04-11T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39639
published_at 2026-04-12T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40327
published_at 2026-04-09T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40265
published_at 2026-04-07T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40316
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218623
reference_id 2218623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218623
16
reference_url https://support.apple.com/en-us/HT213340
reference_id HT213340
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213340
17
reference_url https://support.apple.com/en-us/HT213341
reference_id HT213341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213341
18
reference_url https://support.apple.com/en-us/HT213342
reference_id HT213342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213342
19
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213346
20
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
21
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-48503
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-knds-dwjv-c3c4
17
url VCID-ma6z-vrhf-mqdw
vulnerability_id VCID-ma6z-vrhf-mqdw
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42823
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70264
published_at 2026-04-04T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70246
published_at 2026-04-02T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-09T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70287
published_at 2026-04-08T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.7024
published_at 2026-04-07T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72322
published_at 2026-04-13T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-11T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.72334
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140505
reference_id 2140505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140505
8
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
reference_id 5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
reference_id AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
11
reference_url https://www.debian.org/security/2022/dsa-5273
reference_id dsa-5273
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://www.debian.org/security/2022/dsa-5273
12
reference_url https://www.debian.org/security/2022/dsa-5274
reference_id dsa-5274
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://www.debian.org/security/2022/dsa-5274
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213488
15
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213489
16
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213491
17
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213492
18
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213495
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
reference_id JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
20
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-42823
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ma6z-vrhf-mqdw
18
url VCID-maw9-2k6n-wyea
vulnerability_id VCID-maw9-2k6n-wyea
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42826
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.2786
published_at 2026-04-13T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27852
published_at 2026-04-07T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27919
published_at 2026-04-12T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.2796
published_at 2026-04-09T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27962
published_at 2026-04-11T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28491
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28534
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167716
reference_id 2167716
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167716
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213488
12
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213489
13
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213495
14
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
15
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
aliases CVE-2022-42826
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-maw9-2k6n-wyea
19
url VCID-nykh-jh9p-4bhy
vulnerability_id VCID-nykh-jh9p-4bhy
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42863
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-02T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77186
published_at 2026-04-13T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.7716
published_at 2026-04-04T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77142
published_at 2026-04-07T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77174
published_at 2026-04-08T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77183
published_at 2026-04-09T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.7721
published_at 2026-04-11T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77189
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
16
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156987
reference_id 2156987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156987
18
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
19
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
20
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
21
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://security.gentoo.org/glsa/202305-32
22
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213530
23
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213532
24
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213535
25
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213536
26
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213537
27
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
28
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-42863
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nykh-jh9p-4bhy
20
url VCID-ryxv-e8de-q7h8
vulnerability_id VCID-ryxv-e8de-q7h8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42799
reference_id
reference_type
scores
0
value 0.00462
scoring_system epss
scoring_elements 0.64205
published_at 2026-04-02T12:55:00Z
1
value 0.00462
scoring_system epss
scoring_elements 0.64233
published_at 2026-04-04T12:55:00Z
2
value 0.00462
scoring_system epss
scoring_elements 0.64194
published_at 2026-04-07T12:55:00Z
3
value 0.00462
scoring_system epss
scoring_elements 0.64244
published_at 2026-04-08T12:55:00Z
4
value 0.00462
scoring_system epss
scoring_elements 0.6426
published_at 2026-04-09T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.6692
published_at 2026-04-13T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66964
published_at 2026-04-11T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.66951
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140503
reference_id 2140503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140503
8
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
9
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
10
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-42799
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ryxv-e8de-q7h8
21
url VCID-tmt1-qwc9-nfhs
vulnerability_id VCID-tmt1-qwc9-nfhs
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46698
reference_id
reference_type
scores
0
value 0.00969
scoring_system epss
scoring_elements 0.76564
published_at 2026-04-02T12:55:00Z
1
value 0.00969
scoring_system epss
scoring_elements 0.76613
published_at 2026-04-13T12:55:00Z
2
value 0.00969
scoring_system epss
scoring_elements 0.76593
published_at 2026-04-04T12:55:00Z
3
value 0.00969
scoring_system epss
scoring_elements 0.76573
published_at 2026-04-07T12:55:00Z
4
value 0.00969
scoring_system epss
scoring_elements 0.76605
published_at 2026-04-08T12:55:00Z
5
value 0.00969
scoring_system epss
scoring_elements 0.76617
published_at 2026-04-09T12:55:00Z
6
value 0.00969
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-11T12:55:00Z
7
value 0.00969
scoring_system epss
scoring_elements 0.76623
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156992
reference_id 2156992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156992
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213532
18
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213535
19
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213536
20
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213537
21
reference_url https://support.apple.com/en-us/HT213538
reference_id HT213538
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213538
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46698
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmt1-qwc9-nfhs
22
url VCID-xzgb-egkw-9kdn
vulnerability_id VCID-xzgb-egkw-9kdn
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32888
reference_id
reference_type
scores
0
value 0.00702
scoring_system epss
scoring_elements 0.7202
published_at 2026-04-04T12:55:00Z
1
value 0.00702
scoring_system epss
scoring_elements 0.72
published_at 2026-04-02T12:55:00Z
2
value 0.00702
scoring_system epss
scoring_elements 0.72046
published_at 2026-04-09T12:55:00Z
3
value 0.00702
scoring_system epss
scoring_elements 0.72034
published_at 2026-04-08T12:55:00Z
4
value 0.00702
scoring_system epss
scoring_elements 0.71995
published_at 2026-04-07T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73935
published_at 2026-04-13T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73961
published_at 2026-04-11T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140501
reference_id 2140501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140501
16
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://support.apple.com/en-us/HT213443
reference_id HT213443
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213443
19
reference_url https://support.apple.com/en-us/HT213444
reference_id HT213444
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213444
20
reference_url https://support.apple.com/en-us/HT213445
reference_id HT213445
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213445
21
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213446
22
reference_url https://support.apple.com/en-us/HT213486
reference_id HT213486
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213486
23
reference_url https://support.apple.com/en-us/HT213487
reference_id HT213487
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213487
24
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213488
25
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
26
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-32888
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzgb-egkw-9kdn
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.38.5-1%3Farch=el9