{"url":"http://public2.vulnerablecode.io/api/packages/994455?format=json","purl":"pkg:deb/debian/wpewebkit@2.38.6-1","type":"deb","namespace":"debian","name":"wpewebkit","version":"2.38.6-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.52.3-1","latest_non_vulnerable_version":"2.52.3-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74669?format=json","vulnerability_id":"VCID-1164-uckc-qfbs","summary":"webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40789","reference_id":"","reference_type":"","scores":[{"value":"0.00696","scoring_system":"epss","scoring_elements":"0.71966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00696","scoring_system":"epss","scoring_elements":"0.71921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00696","scoring_system":"epss","scoring_elements":"0.71962","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73269","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.7325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76371","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.7642","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76408","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.764","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76424","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76473","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.7637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00944","scoring_system":"epss","scoring_elements":"0.76382","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76654","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76685","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067","reference_id":"2302067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/kb/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/kb/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40789"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1164-uckc-qfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73819?format=json","vulnerability_id":"VCID-1e6d-p4fv-rubk","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27808","reference_id":"","reference_type":"","scores":[{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74593","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74517","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74524","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74457","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.7442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77899","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314697","reference_id":"2314697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314697"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-27808"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61856?format=json","vulnerability_id":"VCID-1vsk-e1mf-6uaz","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29953","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36076","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37983","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37865","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37945","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37856","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37833","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37909","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273","reference_id":"2386273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61837?format=json","vulnerability_id":"VCID-1xcs-fpk3-nyg4","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44187","reference_id":"","reference_type":"","scores":[{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65867","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.6645","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67584","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67994","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68085","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68028","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68003","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68035","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00554","scoring_system":"epss","scoring_elements":"0.681","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706","reference_id":"2314706","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7079-1/","reference_id":"USN-7079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7079-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-44187"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68448?format=json","vulnerability_id":"VCID-23pb-y6g6-sbed","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24189","reference_id":"","reference_type":"","scores":[{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.76047","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75859","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75889","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75925","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75936","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75944","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75974","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75998","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75997","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75809","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75877","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386267","reference_id":"2386267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24189"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-23pb-y6g6-sbed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64216?format=json","vulnerability_id":"VCID-25ng-4kwb-qfat","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20636","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12549","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18495","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18464","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18494","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18592","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18499","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448791","reference_id":"2448791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20636"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33722?format=json","vulnerability_id":"VCID-2a1d-w9tn-x3h6","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38600","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69872","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71377","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71321","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71294","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7133","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71273","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71172","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/08/02/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/08/02/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231021","reference_id":"2231021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231021"},{"reference_url":"https://www.debian.org/security/2023/dsa-5468","reference_id":"dsa-5468","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://www.debian.org/security/2023/dsa-5468"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213841","reference_id":"HT213841","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213841"},{"reference_url":"https://support.apple.com/en-us/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213843"},{"reference_url":"https://support.apple.com/en-us/HT213846","reference_id":"HT213846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213846"},{"reference_url":"https://support.apple.com/en-us/HT213847","reference_id":"HT213847","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213847"},{"reference_url":"https://support.apple.com/en-us/HT213848","reference_id":"HT213848","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://support.apple.com/en-us/HT213848"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/","reference_id":"KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/","reference_id":"KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38600"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2a1d-w9tn-x3h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66399?format=json","vulnerability_id":"VCID-2hr6-uu49-1qb7","summary":"webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10509","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10469","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1049","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10422","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17108","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2247","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576","reference_id":"2418576","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13947","reference_id":"CVE-2025-13947","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=271957","reference_id":"show_bug.cgi?id=271957","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://bugs.webkit.org/show_bug.cgi?id=271957"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-13947"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61840?format=json","vulnerability_id":"VCID-2nmg-6jk2-ebcb","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44296","reference_id":"","reference_type":"","scores":[{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71214","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71229","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.7406","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74058","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74077","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74099","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74139","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74083","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00818","scoring_system":"epss","scoring_elements":"0.7443","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00818","scoring_system":"epss","scoring_elements":"0.74421","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121563","reference_id":"121563","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121563"},{"reference_url":"https://support.apple.com/en-us/121564","reference_id":"121564","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121564"},{"reference_url":"https://support.apple.com/en-us/121565","reference_id":"121565","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121565"},{"reference_url":"https://support.apple.com/en-us/121566","reference_id":"121566","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121566"},{"reference_url":"https://support.apple.com/en-us/121567","reference_id":"121567","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121567"},{"reference_url":"https://support.apple.com/en-us/121569","reference_id":"121569","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121569"},{"reference_url":"https://support.apple.com/en-us/121571","reference_id":"121571","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121571"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323289","reference_id":"2323289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323289"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9545","reference_id":"RHSA-2024:9545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7113-1/","reference_id":"USN-7113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7113-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-44296"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66451?format=json","vulnerability_id":"VCID-2pgr-9muu-s3ge","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2034","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20329","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20364","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20347","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20467","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20434","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20206","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20279","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2087","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337","reference_id":"2416337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43443"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61844?format=json","vulnerability_id":"VCID-2rm2-f5xj-1bb2","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24208","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30162","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30141","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30071","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30092","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54527","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.5457","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54637","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54581","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357910","reference_id":"2357910","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357910"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24208"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72615?format=json","vulnerability_id":"VCID-2vtf-gudd-9fah","summary":"WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54479","reference_id":"","reference_type":"","scores":[{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70861","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70746","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70737","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70777","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70814","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.7078","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70808","published_at":"2026-05-12T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72027","published_at":"2026-04-16T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72019","published_at":"2026-04-21T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121838","reference_id":"121838","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121838"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333841","reference_id":"2333841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54479"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33709?format=json","vulnerability_id":"VCID-3ab6-tntn-67eb","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28204","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21366","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21453","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2143","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21449","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21665","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209208","reference_id":"2209208","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209208"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213757","reference_id":"HT213757","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213757"},{"reference_url":"https://support.apple.com/en-us/HT213758","reference_id":"HT213758","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213758"},{"reference_url":"https://support.apple.com/en-us/HT213761","reference_id":"HT213761","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213761"},{"reference_url":"https://support.apple.com/en-us/HT213762","reference_id":"HT213762","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213762"},{"reference_url":"https://support.apple.com/en-us/HT213764","reference_id":"HT213764","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213764"},{"reference_url":"https://support.apple.com/en-us/HT213765","reference_id":"HT213765","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/"}],"url":"https://support.apple.com/en-us/HT213765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3432","reference_id":"RHSA-2023:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3433","reference_id":"RHSA-2023:3433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-28204"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ab6-tntn-67eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61836?format=json","vulnerability_id":"VCID-3daw-8nh6-dfcq","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10532","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10241","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10387","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10456","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10433","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10476","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10673","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11342","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11818","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263","reference_id":"2323263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-44185"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71950?format=json","vulnerability_id":"VCID-3frv-ppjt-9bdy","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24143","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32593","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3257","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36207","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36121","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36003","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3607","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36097","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36007","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36029","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36099","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36238","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344621","reference_id":"2344621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24143"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3frv-ppjt-9bdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61852?format=json","vulnerability_id":"VCID-3k6e-zz11-93bn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34253","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3604","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.35947","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36014","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36039","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3595","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.35972","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268","reference_id":"2386268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31273"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33720?format=json","vulnerability_id":"VCID-3r9c-5ys2-43hw","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38597","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55877","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57065","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57124","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57073","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57098","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57161","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57061","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57016","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67436","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231043","reference_id":"2231043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231043"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38597"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3r9c-5ys2-43hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41971?format=json","vulnerability_id":"VCID-3yjx-gswx-g3gt","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23213","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58541","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5847","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58487","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58428","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58385","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58461","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60394","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.6041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60341","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60373","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120306","reference_id":"120306","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120306"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120310","reference_id":"120310","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120310"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270141","reference_id":"2270141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270141"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/27"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/33","reference_id":"33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/33"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/36","reference_id":"36","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/36"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/39","reference_id":"39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/39"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/40","reference_id":"40","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/40"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214055"},{"reference_url":"https://support.apple.com/kb/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214055"},{"reference_url":"https://support.apple.com/en-us/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214056"},{"reference_url":"https://support.apple.com/kb/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214056"},{"reference_url":"https://support.apple.com/en-us/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214059"},{"reference_url":"https://support.apple.com/kb/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214059"},{"reference_url":"https://support.apple.com/en-us/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214060"},{"reference_url":"https://support.apple.com/kb/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214060"},{"reference_url":"https://support.apple.com/en-us/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214061"},{"reference_url":"https://support.apple.com/kb/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214061"},{"reference_url":"https://support.apple.com/en-us/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/en-us/HT214063"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/","reference_id":"US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/"},{"reference_url":"https://usn.ubuntu.com/6631-1/","reference_id":"USN-6631-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6631-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/","reference_id":"X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3yjx-gswx-g3gt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41979?format=json","vulnerability_id":"VCID-455j-vpxx-yudd","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23284","reference_id":"","reference_type":"","scores":[{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69228","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6926","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69301","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69252","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69226","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69184","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69203","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00881","scoring_system":"epss","scoring_elements":"0.75325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75466","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.7546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.7543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.7538","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120880","reference_id":"120880","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120880"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270292","reference_id":"2270292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270292"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/26","reference_id":"26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","reference_id":"AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","reference_id":"BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214082","reference_id":"HT214082","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214082"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214087","reference_id":"HT214087","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214087"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","reference_id":"PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23284"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-455j-vpxx-yudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74668?format=json","vulnerability_id":"VCID-4d1k-nwkw-j3g4","summary":"webkitgtk: webkit2gtk: Private Browsing tabs may be accessed without authentication","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40794.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40794.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40794","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6679","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66633","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66648","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66659","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66647","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66691","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66733","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66706","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66726","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40794"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302066","reference_id":"2302066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302066"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/"}],"url":"https://support.apple.com/en-us/HT214121"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40794"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4d1k-nwkw-j3g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64217?format=json","vulnerability_id":"VCID-4k57-k2s6-wkhx","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20644","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22409","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22364","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22243","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22297","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22265","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22282","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448792","reference_id":"2448792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20644"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47884?format=json","vulnerability_id":"VCID-4kzn-hfnz-3faf","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40451","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43055","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43019","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4296","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4299","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5052","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40451"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/2","reference_id":"2","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241409","reference_id":"2241409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241409"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/3","reference_id":"3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/3"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-40451"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzn-hfnz-3faf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33711?format=json","vulnerability_id":"VCID-5334-8qf3-tqbp","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32373","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10537","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10358","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.103","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10247","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10392","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10461","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10438","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10481","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12768","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12982","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13004","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12931","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209214","reference_id":"2209214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209214"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213757","reference_id":"HT213757","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213757"},{"reference_url":"https://support.apple.com/en-us/HT213758","reference_id":"HT213758","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213758"},{"reference_url":"https://support.apple.com/en-us/HT213761","reference_id":"HT213761","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213761"},{"reference_url":"https://support.apple.com/en-us/HT213762","reference_id":"HT213762","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213762"},{"reference_url":"https://support.apple.com/en-us/HT213764","reference_id":"HT213764","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213764"},{"reference_url":"https://support.apple.com/en-us/HT213765","reference_id":"HT213765","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/"}],"url":"https://support.apple.com/en-us/HT213765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3432","reference_id":"RHSA-2023:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3433","reference_id":"RHSA-2023:3433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-32373"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5334-8qf3-tqbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41966?format=json","vulnerability_id":"VCID-53ct-99rf-sydt","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42843","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26538","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26653","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26503","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26572","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26556","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26573","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27633","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27689","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32648","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271717","reference_id":"2271717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271717"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT213981","reference_id":"HT213981","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213981"},{"reference_url":"https://support.apple.com/en-us/HT213982","reference_id":"HT213982","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213982"},{"reference_url":"https://support.apple.com/en-us/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213984"},{"reference_url":"https://support.apple.com/en-us/HT213986","reference_id":"HT213986","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://support.apple.com/en-us/HT213986"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42843"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-53ct-99rf-sydt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61855?format=json","vulnerability_id":"VCID-5q44-vqhn-zydx","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26334","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26221","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3198","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33793","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33835","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33746","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33769","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33845","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271","reference_id":"2386271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43212"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71951?format=json","vulnerability_id":"VCID-5x1k-uam9-5bhs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24162","reference_id":"","reference_type":"","scores":[{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78927","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78763","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78791","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78836","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78859","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78873","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.7887","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78888","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.7871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78766","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344624","reference_id":"2344624","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1957","reference_id":"RHSA-2025:1957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1958","reference_id":"RHSA-2025:1958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1959","reference_id":"RHSA-2025:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1960","reference_id":"RHSA-2025:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2035","reference_id":"RHSA-2025:2035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2121","reference_id":"RHSA-2025:2121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2126","reference_id":"RHSA-2025:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2126"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24162"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5x1k-uam9-5bhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33721?format=json","vulnerability_id":"VCID-6uck-ed5x-fyga","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38599","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58257","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58292","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62891","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62928","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67827","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67885","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67737","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67794","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67833","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67802","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231020","reference_id":"2231020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231020"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38599"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6uck-ed5x-fyga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75753?format=json","vulnerability_id":"VCID-6xkn-7q6s-5fey","summary":"webkit: pointer authentication bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27834","reference_id":"","reference_type":"","scores":[{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00814","published_at":"2026-05-14T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00806","published_at":"2026-05-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00702","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00773","published_at":"2026-04-16T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00772","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00778","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00784","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00788","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00701","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00697","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00811","published_at":"2026-05-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00815","published_at":"2026-05-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00819","published_at":"2026-05-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0082","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00825","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00824","published_at":"2026-04-24T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00822","published_at":"2026-05-05T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00777","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/21/1","reference_id":"1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/21/1"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/10","reference_id":"10","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/10"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/12","reference_id":"12","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/12"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/16","reference_id":"16","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/17","reference_id":"17","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/17"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282412","reference_id":"2282412","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2282412"},{"reference_url":"http://seclists.org/fulldisclosure/2024/May/9","reference_id":"9","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"http://seclists.org/fulldisclosure/2024/May/9"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/","reference_id":"ADCLQW54XN37VJZNYD3UKCYATJFIMYXG","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6788-1/","reference_id":"USN-6788-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6788-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/","reference_id":"WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-27834"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkn-7q6s-5fey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33715?format=json","vulnerability_id":"VCID-71d6-g16a-3qa9","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38133","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57433","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57384","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57428","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5749","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57439","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57464","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60697","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60703","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.6069","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61962","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61977","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6196","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231015","reference_id":"2231015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231015"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38133"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71d6-g16a-3qa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65877?format=json","vulnerability_id":"VCID-76jg-y2sa-f7cu","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43501","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16254","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16145","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16179","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28795","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28542","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28521","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2846","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28961","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28684","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423185","reference_id":"2423185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43501"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33726?format=json","vulnerability_id":"VCID-7ehr-3myw-g7b1","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42917","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20872","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20792","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20718","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2063","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25335","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25318","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25411","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/05/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/05/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253058","reference_id":"2253058","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253058"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/3"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/35","reference_id":"35","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/35"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/4","reference_id":"4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/4"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/5","reference_id":"5","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/5"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","reference_id":"AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5575","reference_id":"dsa-5575","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://www.debian.org/security/2023/dsa-5575"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT214031","reference_id":"HT214031","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214031"},{"reference_url":"https://support.apple.com/en-us/HT214032","reference_id":"HT214032","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214032"},{"reference_url":"https://support.apple.com/en-us/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214034"},{"reference_url":"https://support.apple.com/kb/HT214062","reference_id":"HT214062","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","reference_id":"P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7715","reference_id":"RHSA-2023:7715","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7715"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7716","reference_id":"RHSA-2023:7716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6545-1/","reference_id":"USN-6545-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6545-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42917"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ehr-3myw-g7b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61841?format=json","vulnerability_id":"VCID-7gyr-mvmk-pfh9","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54467","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30308","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3075","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30716","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30433","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30209","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3028","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30288","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30215","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30237","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40547","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43266","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43221","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353872","reference_id":"2353872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353872"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54467"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66445?format=json","vulnerability_id":"VCID-7j7p-hnbd-hudk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13587","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18751","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18817","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18779","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18818","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18811","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18912","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18631","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18715","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19305","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330","reference_id":"2416330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43429"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64206?format=json","vulnerability_id":"VCID-7ut5-fu6w-63fs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43213","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31172","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37419","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37437","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37363","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39577","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39642","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39669","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39709","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39573","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39598","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39659","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41898","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448781","reference_id":"2448781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63947?format=json","vulnerability_id":"VCID-88kv-qter-5fc3","summary":"webkitgtk: A malicious website may be able to access script message handlers intended for other origins","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28861","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10489","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11494","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11544","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12109","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12175","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12083","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453007","reference_id":"2453007","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453007"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28861"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88kv-qter-5fc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63942?format=json","vulnerability_id":"VCID-8cxd-4p9j-dyf1","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20664","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11433","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12357","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12497","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12551","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12577","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12642","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453001","reference_id":"2453001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20664"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cxd-4p9j-dyf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41969?format=json","vulnerability_id":"VCID-8ncw-zt4k-73ak","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42956","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53603","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53544","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53526","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53562","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53548","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53507","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53532","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53515","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271719","reference_id":"2271719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271719"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42956"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ncw-zt4k-73ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41978?format=json","vulnerability_id":"VCID-8utu-penp-rbax","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23280","reference_id":"","reference_type":"","scores":[{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70103","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70148","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70197","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.7012","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70151","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70121","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.7008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70488","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270291","reference_id":"2270291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270291"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","reference_id":"AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","reference_id":"BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","reference_id":"PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23280"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8utu-penp-rbax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66440?format=json","vulnerability_id":"VCID-933e-5azn-6yec","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43000","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05613","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05612","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05605","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05529","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05483","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0548","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07727","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18675","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18673","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26483","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120324","reference_id":"120324","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120324"},{"reference_url":"https://support.apple.com/en-us/120331","reference_id":"120331","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120331"},{"reference_url":"https://support.apple.com/en-us/120338","reference_id":"120338","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120338"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416324","reference_id":"2416324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-43000"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-933e-5azn-6yec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64212?format=json","vulnerability_id":"VCID-988h-sqnj-57fg","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43511","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18399","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18277","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18306","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31708","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31581","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31418","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31427","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31875","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448787","reference_id":"2448787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43511"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66452?format=json","vulnerability_id":"VCID-9dnz-1f32-gfdp","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43480","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11718","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11566","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11459","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11595","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11646","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11617","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11658","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416338","reference_id":"2416338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-43480"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dnz-1f32-gfdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72614?format=json","vulnerability_id":"VCID-9j6k-np3x-23f7","summary":"webkit: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54508","reference_id":"","reference_type":"","scores":[{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80497","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80304","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80331","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80333","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80338","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80364","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.8037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80444","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80439","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80456","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80656","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333845","reference_id":"2333845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54508"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33710?format=json","vulnerability_id":"VCID-a35x-vamv-zyez","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32370","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08333","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08197","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08266","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08251","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08279","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08065","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08049","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08139","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.081","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/11/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/11/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238944","reference_id":"2238944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238944"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-32370"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a35x-vamv-zyez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66446?format=json","vulnerability_id":"VCID-ahcu-937r-57fu","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26552","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26497","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26576","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26759","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26496","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27201","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27546","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331","reference_id":"2416331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43430"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67451?format=json","vulnerability_id":"VCID-aqvh-emss-bufx","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43368","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17045","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20676","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21396","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21378","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21352","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21439","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21416","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21543","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125110","reference_id":"125110","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/"}],"url":"https://support.apple.com/en-us/125110"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397630","reference_id":"2397630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43368"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66442?format=json","vulnerability_id":"VCID-az2z-2mnu-sfbh","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43419","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10581","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17112","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17196","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17182","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17129","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16916","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17009","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17103","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17076","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17625","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416326","reference_id":"2416326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43419"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61843?format=json","vulnerability_id":"VCID-azef-hxum-z3eb","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24201","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27125","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42378","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42284","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42311","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45317","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46824","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46804","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52889","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122281","reference_id":"122281","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122281"},{"reference_url":"https://support.apple.com/en-us/122283","reference_id":"122283","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122283"},{"reference_url":"https://support.apple.com/en-us/122284","reference_id":"122284","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122284"},{"reference_url":"https://support.apple.com/en-us/122285","reference_id":"122285","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122285"},{"reference_url":"https://support.apple.com/en-us/122345","reference_id":"122345","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122345"},{"reference_url":"https://support.apple.com/en-us/122346","reference_id":"122346","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122346"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122376","reference_id":"122376","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122376"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351802","reference_id":"2351802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351802"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2863","reference_id":"RHSA-2025:2863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2864","reference_id":"RHSA-2025:2864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2997","reference_id":"RHSA-2025:2997","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2997"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2998","reference_id":"RHSA-2025:2998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3000","reference_id":"RHSA-2025:3000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3001","reference_id":"RHSA-2025:3001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3002","reference_id":"RHSA-2025:3002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3005","reference_id":"RHSA-2025:3005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3034","reference_id":"RHSA-2025:3034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3034"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24201"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72611?format=json","vulnerability_id":"VCID-b3dw-sj5b-5bhr","summary":"webkit: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54502","reference_id":"","reference_type":"","scores":[{"value":"0.05739","scoring_system":"epss","scoring_elements":"0.9041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.9167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.92025","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.92001","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.92009","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.91971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.91965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.91969","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.91978","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07766","scoring_system":"epss","scoring_elements":"0.91992","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333843","reference_id":"2333843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54502"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71949?format=json","vulnerability_id":"VCID-b8ws-1k92-7bhq","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54543","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34133","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34197","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34235","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34128","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34156","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34877","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344619","reference_id":"2344619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1957","reference_id":"RHSA-2025:1957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1958","reference_id":"RHSA-2025:1958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1959","reference_id":"RHSA-2025:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1960","reference_id":"RHSA-2025:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2035","reference_id":"RHSA-2025:2035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2121","reference_id":"RHSA-2025:2121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2126","reference_id":"RHSA-2025:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2126"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54543"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64209?format=json","vulnerability_id":"VCID-bjtx-twmy-jbgk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1502","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15103","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15147","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784","reference_id":"2448784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43438"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61847?format=json","vulnerability_id":"VCID-bkcz-d48v-7uca","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24213","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1085","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1078","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10761","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10803","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31301","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31452","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31533","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3183","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31879","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31916","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357913","reference_id":"2357913","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357913"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47885?format=json","vulnerability_id":"VCID-br5g-pfa4-33h7","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41074","reference_id":"","reference_type":"","scores":[{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78271","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.7831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01216","scoring_system":"epss","scoring_elements":"0.79172","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01216","scoring_system":"epss","scoring_elements":"0.79109","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01216","scoring_system":"epss","scoring_elements":"0.79122","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01216","scoring_system":"epss","scoring_elements":"0.79142","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01216","scoring_system":"epss","scoring_elements":"0.79159","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01216","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01216","scoring_system":"epss","scoring_elements":"0.79156","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241412","reference_id":"2241412","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241412"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6426-1/","reference_id":"USN-6426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6426-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-41074"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-br5g-pfa4-33h7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69654?format=json","vulnerability_id":"VCID-c4np-b4zq-tkch","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71426","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71319","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71345","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7138","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71344","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71372","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500","reference_id":"2366500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-31204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69657?format=json","vulnerability_id":"VCID-c9mb-24v2-q3ba","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215","reference_id":"","reference_type":"","scores":[{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78436","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.7828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78309","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78344","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.7837","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78386","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78381","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78397","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503","reference_id":"2366503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-31215"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72076?format=json","vulnerability_id":"VCID-ceyb-j3sq-27fh","summary":"webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27856","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07103","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07013","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07194","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07434","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07363","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07208","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07447","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10405","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10504","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344618","reference_id":"2344618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-27856"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyb-j3sq-27fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61842?format=json","vulnerability_id":"VCID-cmdy-ztbw-jffq","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54551","reference_id":"","reference_type":"","scores":[{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37011","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36904","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36971","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36989","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36911","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36934","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66204","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.6619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.6615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.6618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66199","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357909","reference_id":"2357909","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357909"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61849?format=json","vulnerability_id":"VCID-cw56-pdyr-fbge","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24216","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3041","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30395","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30319","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30342","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74508","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74479","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74475","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.7439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74397","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74413","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357917","reference_id":"2357917","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357917"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47886?format=json","vulnerability_id":"VCID-dafx-64dz-ubfw","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41983","reference_id":"","reference_type":"","scores":[{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78065","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78095","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78077","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.80104","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.7995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.79979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.79984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.80013","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.80036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.8005","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.80047","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01326","scoring_system":"epss","scoring_elements":"0.80063","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271453","reference_id":"2271453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271453"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6490-1/","reference_id":"USN-6490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6490-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-41983"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dafx-64dz-ubfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72793?format=json","vulnerability_id":"VCID-dd4q-8fs5-3kej","summary":"webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44308","reference_id":"","reference_type":"","scores":[{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73647","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73566","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73582","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73605","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73589","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81406","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81399","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0157","scoring_system":"epss","scoring_elements":"0.81593","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0157","scoring_system":"epss","scoring_elements":"0.81586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01589","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121752","reference_id":"121752","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121752"},{"reference_url":"https://support.apple.com/en-us/121753","reference_id":"121753","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121753"},{"reference_url":"https://support.apple.com/en-us/121754","reference_id":"121754","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121754"},{"reference_url":"https://support.apple.com/en-us/121755","reference_id":"121755","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121755"},{"reference_url":"https://support.apple.com/en-us/121756","reference_id":"121756","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121756"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327931","reference_id":"2327931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7142-1/","reference_id":"USN-7142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-44308"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dd4q-8fs5-3kej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69652?format=json","vulnerability_id":"VCID-drtd-1c4r-1bbf","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42970","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64638","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64491","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64512","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64524","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64546","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64591","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64562","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64585","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64414","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120330","reference_id":"120330","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120330"},{"reference_url":"https://support.apple.com/en-us/120947","reference_id":"120947","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120947"},{"reference_url":"https://support.apple.com/en-us/120948","reference_id":"120948","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120948"},{"reference_url":"https://support.apple.com/en-us/120949","reference_id":"120949","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120949"},{"reference_url":"https://support.apple.com/en-us/120950","reference_id":"120950","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366498","reference_id":"2366498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366498"},{"reference_url":"https://security.archlinux.org/ASA-202505-2","reference_id":"ASA-202505-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-2"},{"reference_url":"https://security.archlinux.org/ASA-202505-3","reference_id":"ASA-202505-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-3"},{"reference_url":"https://security.archlinux.org/ASA-202505-4","reference_id":"ASA-202505-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-4"},{"reference_url":"https://security.archlinux.org/ASA-202505-5","reference_id":"ASA-202505-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-5"},{"reference_url":"https://security.archlinux.org/AVG-2867","reference_id":"AVG-2867","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2867"},{"reference_url":"https://security.archlinux.org/AVG-2868","reference_id":"AVG-2868","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2868"},{"reference_url":"https://security.archlinux.org/AVG-2869","reference_id":"AVG-2869","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2869"},{"reference_url":"https://security.archlinux.org/AVG-2870","reference_id":"AVG-2870","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42970"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drtd-1c4r-1bbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65878?format=json","vulnerability_id":"VCID-dvx9-km9t-yqfv","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43531","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22449","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2237","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37579","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37694","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37533","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37552","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423187","reference_id":"2423187","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43531"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73822?format=json","vulnerability_id":"VCID-dxsm-nf4f-yfe4","summary":"webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27833","reference_id":"","reference_type":"","scores":[{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79254","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79236","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79237","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.7922","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79199","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79186","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79162","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.7913","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79133","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79105","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81967","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314700","reference_id":"2314700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314700"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-27833"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33725?format=json","vulnerability_id":"VCID-e5f7-5sx3-27b1","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42916","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14641","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14545","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14646","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14738","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1454","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14435","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14407","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15673","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15632","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15653","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15551","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15431","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15746","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/05/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/05/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253054","reference_id":"2253054","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253054"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/3","reference_id":"3","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/3"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/35","reference_id":"35","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/35"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/4","reference_id":"4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/4"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/5","reference_id":"5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/5"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/8","reference_id":"8","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","reference_id":"AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5575","reference_id":"dsa-5575","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://www.debian.org/security/2023/dsa-5575"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT214031","reference_id":"HT214031","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/en-us/HT214031"},{"reference_url":"https://support.apple.com/en-us/HT214032","reference_id":"HT214032","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/en-us/HT214032"},{"reference_url":"https://support.apple.com/en-us/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/en-us/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/kb/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/kb/HT214034"},{"reference_url":"https://support.apple.com/kb/HT214062","reference_id":"HT214062","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://support.apple.com/kb/HT214062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","reference_id":"P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6545-1/","reference_id":"USN-6545-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6545-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42916"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e5f7-5sx3-27b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67448?format=json","vulnerability_id":"VCID-ednn-ppw1-myfk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43272","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19614","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19534","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21978","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25893","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25834","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25996","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25948","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25875","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25892","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2597","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26056","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397626","reference_id":"2397626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43272"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66367?format=json","vulnerability_id":"VCID-ems1-41u6-vbex","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21892","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27485","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27241","published_at":"2026-05-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27325","published_at":"2026-05-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27255","published_at":"2026-05-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27709","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27333","published_at":"2026-05-14T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27243","published_at":"2026-05-05T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27304","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28104","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855","reference_id":"2418855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43458"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66453?format=json","vulnerability_id":"VCID-epzj-t14z-43d2","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08344","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11372","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1128","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11306","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11175","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11366","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11331","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11424","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11718","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355","reference_id":"2416355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43421"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63948?format=json","vulnerability_id":"VCID-eu4s-vvyf-pqh3","summary":"webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28871","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10108","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10022","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09999","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11098","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1097","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11108","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1118","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11147","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11189","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1124","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453008","reference_id":"2453008","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28871"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu4s-vvyf-pqh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69656?format=json","vulnerability_id":"VCID-ey9n-zksh-mbfm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206","reference_id":"","reference_type":"","scores":[{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78338","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78183","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78178","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.7821","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78216","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.7823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78269","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78287","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78298","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502","reference_id":"2366502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-31206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47880?format=json","vulnerability_id":"VCID-f8z1-mtxh-1bhz","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32359","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27529","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27538","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27425","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27245","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27076","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2714","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27161","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2708","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27095","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27167","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271449","reference_id":"2271449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271449"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-32359"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f8z1-mtxh-1bhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41970?format=json","vulnerability_id":"VCID-fcdg-eddn-cbd2","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23206.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23206","reference_id":"","reference_type":"","scores":[{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65084","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65028","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65006","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.65037","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64995","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64947","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64959","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00477","scoring_system":"epss","scoring_elements":"0.64939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66782","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66771","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120306","reference_id":"120306","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/120306"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120310","reference_id":"120310","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/120310"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269743","reference_id":"2269743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269743"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/27","reference_id":"27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/27"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/33","reference_id":"33","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/33"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/36","reference_id":"36","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/36"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/39","reference_id":"39","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/39"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/40","reference_id":"40","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/40"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/HT214055"},{"reference_url":"https://support.apple.com/kb/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/kb/HT214055"},{"reference_url":"https://support.apple.com/en-us/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/HT214056"},{"reference_url":"https://support.apple.com/kb/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/kb/HT214056"},{"reference_url":"https://support.apple.com/en-us/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/HT214059"},{"reference_url":"https://support.apple.com/kb/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/kb/HT214059"},{"reference_url":"https://support.apple.com/en-us/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/HT214060"},{"reference_url":"https://support.apple.com/kb/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/kb/HT214060"},{"reference_url":"https://support.apple.com/en-us/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/HT214061"},{"reference_url":"https://support.apple.com/kb/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/kb/HT214061"},{"reference_url":"https://support.apple.com/en-us/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/en-us/HT214063"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/","reference_id":"US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/"},{"reference_url":"https://usn.ubuntu.com/6631-1/","reference_id":"USN-6631-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6631-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/","reference_id":"X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23206"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcdg-eddn-cbd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63946?format=json","vulnerability_id":"VCID-ffha-wafn-sqa9","summary":"webkitgtk: A malicious website may be able to process restricted web content outside the sandbox","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28859","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.12006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11996","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11889","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13114","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13105","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13207","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12882","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126797","reference_id":"126797","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126797"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453006","reference_id":"2453006","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28859"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffha-wafn-sqa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63944?format=json","vulnerability_id":"VCID-fpvs-seby-kfhv","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20691","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10489","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11515","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11609","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11554","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11494","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11544","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453003","reference_id":"2453003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20691"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpvs-seby-kfhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69658?format=json","vulnerability_id":"VCID-fzqz-yfn1-7yfd","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257","reference_id":"","reference_type":"","scores":[{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74139","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74116","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74155","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74133","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74112","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74104","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7407","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74079","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74069","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74034","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74343","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504","reference_id":"2366504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-31257"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71911?format=json","vulnerability_id":"VCID-g2uh-tzx9-bqc7","summary":"webkitgtk: Processing web content may lead to a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54658","reference_id":"","reference_type":"","scores":[{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4353","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43384","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43353","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43415","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43397","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43451","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43534","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43447","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.4428","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44313","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344946","reference_id":"2344946","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54658"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g2uh-tzx9-bqc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33712?format=json","vulnerability_id":"VCID-g4ct-k4dv-s7fs","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32393","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38694","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38898","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46827","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.4689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46886","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.4681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46829","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5227","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52276","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52299","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5238","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224608","reference_id":"2224608","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224608"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-32393"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g4ct-k4dv-s7fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73823?format=json","vulnerability_id":"VCID-gjvy-329h-dkgp","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27838","reference_id":"","reference_type":"","scores":[{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75726","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7567","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75654","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75669","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75644","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75614","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80031","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27838"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314702","reference_id":"2314702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314702"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-27838"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gjvy-329h-dkgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64203?format=json","vulnerability_id":"VCID-gn1n-fjzp-hqe2","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43010","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1427","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15537","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15443","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15563","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15665","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15644","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15685","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15758","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15528","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120300","reference_id":"120300","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120300"},{"reference_url":"https://support.apple.com/en-us/120877","reference_id":"120877","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120877"},{"reference_url":"https://support.apple.com/en-us/120879","reference_id":"120879","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120879"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://support.apple.com/en-us/126646","reference_id":"126646","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/126646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448778","reference_id":"2448778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-43010"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gn1n-fjzp-hqe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66443?format=json","vulnerability_id":"VCID-gqjq-p4re-gkf6","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14785","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14706","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14575","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14664","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14662","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14944","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327","reference_id":"2416327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43425"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63943?format=json","vulnerability_id":"VCID-gqm2-5nh3-7ufp","summary":"webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20665","reference_id":"","reference_type":"","scores":[{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36537","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36504","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37903","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38022","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3799","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37957","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126797","reference_id":"126797","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126797"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453002","reference_id":"2453002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20665"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm2-5nh3-7ufp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64205?format=json","vulnerability_id":"VCID-gwt6-n8ue-mqcf","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31277","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37931","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37888","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37968","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37878","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37855","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39147","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39163","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.4111","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448780","reference_id":"2448780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31277"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41976?format=json","vulnerability_id":"VCID-h7uu-gj11-a3er","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23263","reference_id":"","reference_type":"","scores":[{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58619","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.5852","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58566","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58508","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58498","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.69996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70083","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70044","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.7006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.7002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.69972","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120880","reference_id":"120880","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120880"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270290","reference_id":"2270290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270290"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/26","reference_id":"26","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/","reference_id":"AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/","reference_id":"BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214082","reference_id":"HT214082","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214082"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214087","reference_id":"HT214087","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214087"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/","reference_id":"PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23263"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h7uu-gj11-a3er"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71948?format=json","vulnerability_id":"VCID-hp6k-spzk-vbaa","summary":"webkitgtk: Copying a URL from Web Inspector may lead to command injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24150","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53944","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54036","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58804","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58852","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58911","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58867","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58894","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58966","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58839","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.5884","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344622","reference_id":"2344622","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24150"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hp6k-spzk-vbaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61860?format=json","vulnerability_id":"VCID-hvj6-wsg9-1bhg","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07746","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07596","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08656","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08821","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08786","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08814","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08871","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08591","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08733","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276","reference_id":"2386276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43265"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65881?format=json","vulnerability_id":"VCID-j31g-7h17-27c8","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43541","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20125","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20079","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20244","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20163","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20132","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20155","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423191","reference_id":"2423191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43541"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64204?format=json","vulnerability_id":"VCID-jbuw-yp7v-4fcz","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31223","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66935","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66903","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66945","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66984","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66956","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67378","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448779","reference_id":"2448779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66054?format=json","vulnerability_id":"VCID-jyw2-fu8s-3fha","summary":"Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14174","reference_id":"","reference_type":"","scores":[{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54187","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54092","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54117","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57597","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.7521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75819","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.7708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77622","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421824","reference_id":"2421824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421824"},{"reference_url":"https://issues.chromium.org/issues/466192044","reference_id":"466192044","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/"}],"url":"https://issues.chromium.org/issues/466192044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html","reference_id":"stable-channel-update-for-desktop_10.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/"}],"url":"https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-14174"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33708?format=json","vulnerability_id":"VCID-kbr6-94t1-87hd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28198","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17227","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17093","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16958","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1705","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20629","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20556","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20533","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238943","reference_id":"2238943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238943"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-28198"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbr6-94t1-87hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41963?format=json","vulnerability_id":"VCID-kbzp-1gvm-b3ex","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40414","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36335","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35811","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36239","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35959","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35927","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35839","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35791","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35813","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35721","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35744","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36276","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270143","reference_id":"2270143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270143"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT213936","reference_id":"HT213936","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213936"},{"reference_url":"https://support.apple.com/en-us/HT213937","reference_id":"HT213937","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213937"},{"reference_url":"https://support.apple.com/en-us/HT213938","reference_id":"HT213938","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213938"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-40414"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbzp-1gvm-b3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69653?format=json","vulnerability_id":"VCID-kdvu-rhgt-xqat","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45742","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45878","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45908","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45902","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45729","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45623","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45685","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45704","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45672","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45853","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499","reference_id":"2366499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47882?format=json","vulnerability_id":"VCID-kj3w-6p1u-87b9","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39434.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39434","reference_id":"","reference_type":"","scores":[{"value":"0.00498","scoring_system":"epss","scoring_elements":"0.66057","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00498","scoring_system":"epss","scoring_elements":"0.65966","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00498","scoring_system":"epss","scoring_elements":"0.6601","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00498","scoring_system":"epss","scoring_elements":"0.6598","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00498","scoring_system":"epss","scoring_elements":"0.66","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7083","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70853","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70914","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70933","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241405","reference_id":"2241405","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241405"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/3"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/8"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/9","reference_id":"9","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/9"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213937","reference_id":"HT213937","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213937"},{"reference_url":"https://support.apple.com/en-us/HT213938","reference_id":"HT213938","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213938"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213940"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-39434"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kj3w-6p1u-87b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33717?format=json","vulnerability_id":"VCID-kj7n-3mny-wkgr","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38592","reference_id":"","reference_type":"","scores":[{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67411","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69019","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.6901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68999","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74099","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74178","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74116","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74138","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74122","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231017","reference_id":"2231017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231017"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38592"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kj7n-3mny-wkgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74539?format=json","vulnerability_id":"VCID-kp4m-h6ua-h7dm","summary":"webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40776","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57371","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57375","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5928","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64785","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6484","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64794","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64725","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64702","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64764","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65382","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301841","reference_id":"2301841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301841"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40776"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kp4m-h6ua-h7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69655?format=json","vulnerability_id":"VCID-ksq5-ygcp-nbaz","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37489","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37961","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3794","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37915","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37551","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37436","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37506","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37524","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37437","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37994","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501","reference_id":"2366501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-31205"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72613?format=json","vulnerability_id":"VCID-kuyh-x3z4-q7gf","summary":"webkit: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54505","reference_id":"","reference_type":"","scores":[{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72161","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72207","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.7218","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.7219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72265","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72217","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72174","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72169","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121838","reference_id":"121838","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121838"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333844","reference_id":"2333844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54505"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67450?format=json","vulnerability_id":"VCID-kx6w-wbua-5ffr","summary":"webkitgtk: A website may be able to access sensor information without user consent","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43356","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16803","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16716","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16658","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1667","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16718","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16681","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17557","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17611","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17565","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17662","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125109","reference_id":"125109","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125109"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397628","reference_id":"2397628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43356"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61851?format=json","vulnerability_id":"VCID-ky87-8zpf-nqg2","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30427","reference_id":"","reference_type":"","scores":[{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.366","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36587","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36504","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36526","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78262","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7835","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78324","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78257","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78252","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78234","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357919","reference_id":"2357919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357919"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-30427"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66910?format=json","vulnerability_id":"VCID-m59e-8bgm-77he","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43343","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35061","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.441","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44055","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44085","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44151","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44222","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44022","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44117","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125110","reference_id":"125110","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125110"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403598","reference_id":"2403598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18070","reference_id":"RHSA-2025:18070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19913","reference_id":"RHSA-2025:19913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19914","reference_id":"RHSA-2025:19914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19915","reference_id":"RHSA-2025:19915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19916","reference_id":"RHSA-2025:19916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19918","reference_id":"RHSA-2025:19918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19919","reference_id":"RHSA-2025:19919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19920","reference_id":"RHSA-2025:19920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19946","reference_id":"RHSA-2025:19946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7895-1/","reference_id":"USN-7895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43343"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61838?format=json","vulnerability_id":"VCID-mch4-qacj-f7ey","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44192","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33463","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33934","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3356","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33455","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33339","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33406","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33447","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3336","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33384","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43358","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353871","reference_id":"2353871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353871"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-44192"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66449?format=json","vulnerability_id":"VCID-mfg4-2ma4-3qgj","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15147","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1502","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15103","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15473","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335","reference_id":"2416335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43434"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66447?format=json","vulnerability_id":"VCID-mhfm-j5xm-wybd","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20244","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20279","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20227","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20277","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20383","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20296","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20153","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20796","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332","reference_id":"2416332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43431"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64215?format=json","vulnerability_id":"VCID-mmcp-4qnx-5ufh","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20635","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15297","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15357","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15207","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15212","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24012","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24221","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2413","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24044","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24026","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24043","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2393","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126351","reference_id":"126351","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126351"},{"reference_url":"https://support.apple.com/en-us/126352","reference_id":"126352","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126352"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448790","reference_id":"2448790","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20635"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41967?format=json","vulnerability_id":"VCID-mu71-qcsx-33fj","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42950","reference_id":"","reference_type":"","scores":[{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70872","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70725","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70704","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70824","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7079","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70818","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271718","reference_id":"2271718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271718"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://support.apple.com/en-us/HT214040","reference_id":"HT214040","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214040"},{"reference_url":"https://support.apple.com/en-us/HT214041","reference_id":"HT214041","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://support.apple.com/en-us/HT214041"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42950"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mu71-qcsx-33fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69651?format=json","vulnerability_id":"VCID-mvm2-2uz9-bufg","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42875","reference_id":"","reference_type":"","scores":[{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52402","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52292","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52335","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52395","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52378","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52298","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52241","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52321","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120330","reference_id":"120330","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120330"},{"reference_url":"https://support.apple.com/en-us/120947","reference_id":"120947","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120947"},{"reference_url":"https://support.apple.com/en-us/120948","reference_id":"120948","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120948"},{"reference_url":"https://support.apple.com/en-us/120949","reference_id":"120949","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120949"},{"reference_url":"https://support.apple.com/en-us/120950","reference_id":"120950","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366497","reference_id":"2366497","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366497"},{"reference_url":"https://security.archlinux.org/ASA-202505-2","reference_id":"ASA-202505-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-2"},{"reference_url":"https://security.archlinux.org/ASA-202505-3","reference_id":"ASA-202505-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-3"},{"reference_url":"https://security.archlinux.org/ASA-202505-4","reference_id":"ASA-202505-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-4"},{"reference_url":"https://security.archlinux.org/ASA-202505-5","reference_id":"ASA-202505-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-5"},{"reference_url":"https://security.archlinux.org/AVG-2867","reference_id":"AVG-2867","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2867"},{"reference_url":"https://security.archlinux.org/AVG-2868","reference_id":"AVG-2868","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2868"},{"reference_url":"https://security.archlinux.org/AVG-2869","reference_id":"AVG-2869","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2869"},{"reference_url":"https://security.archlinux.org/AVG-2870","reference_id":"AVG-2870","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42875"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mvm2-2uz9-bufg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33723?format=json","vulnerability_id":"VCID-n7a4-nphm-ufam","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38611","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69872","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7133","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71294","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71321","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71377","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71273","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71295","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231022","reference_id":"2231022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231022"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38611"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7a4-nphm-ufam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61839?format=json","vulnerability_id":"VCID-n7w5-dz8n-mbht","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51365","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56358","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56319","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56383","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56335","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56419","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56338","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.5627","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121563","reference_id":"121563","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121563"},{"reference_url":"https://support.apple.com/en-us/121564","reference_id":"121564","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121564"},{"reference_url":"https://support.apple.com/en-us/121565","reference_id":"121565","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121565"},{"reference_url":"https://support.apple.com/en-us/121566","reference_id":"121566","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121566"},{"reference_url":"https://support.apple.com/en-us/121569","reference_id":"121569","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121569"},{"reference_url":"https://support.apple.com/en-us/121571","reference_id":"121571","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121571"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278","reference_id":"2323278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9545","reference_id":"RHSA-2024:9545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7113-1/","reference_id":"USN-7113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7113-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-44244"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47881?format=json","vulnerability_id":"VCID-nhy8-sfpr-eudu","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35074","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69589","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69341","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69541","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69517","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69549","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69514","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69472","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69493","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69481","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69437","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69427","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69338","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-35074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/10","reference_id":"10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/10"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241403","reference_id":"2241403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241403"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/28/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/28/3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/","reference_id":"4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/8"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/9","reference_id":"9","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/9"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213936","reference_id":"HT213936","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213936"},{"reference_url":"https://support.apple.com/en-us/HT213937","reference_id":"HT213937","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213937"},{"reference_url":"https://support.apple.com/en-us/HT213938","reference_id":"HT213938","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213938"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://support.apple.com/en-us/HT213941","reference_id":"HT213941","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/"}],"url":"https://support.apple.com/en-us/HT213941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-35074"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nhy8-sfpr-eudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65880?format=json","vulnerability_id":"VCID-nmvc-maj7-rfhm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43536","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11342","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11245","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11288","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24416","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24431","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24471","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2429","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24527","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423190","reference_id":"2423190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43536"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61859?format=json","vulnerability_id":"VCID-nu9v-3xak-77aw","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17674","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17722","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25457","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25518","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25458","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25537","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25562","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2539","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385","reference_id":"2384385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43240"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63941?format=json","vulnerability_id":"VCID-nwkr-s7vs-p7fz","summary":"webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20643","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0982","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10942","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10864","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10904","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10705","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10994","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1084","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10912","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10897","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126604","reference_id":"126604","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126604"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453000","reference_id":"2453000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20643"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nwkr-s7vs-p7fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61858?format=json","vulnerability_id":"VCID-p84d-5ze6-9fb5","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43228","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12046","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12075","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20293","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20136","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20184","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20205","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20182","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20148","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20062","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20219","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386275","reference_id":"2386275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386275"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43228"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73825?format=json","vulnerability_id":"VCID-pg5b-3vcj-7bav","summary":"webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27851","reference_id":"","reference_type":"","scores":[{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76913","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76896","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76908","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76892","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76871","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76859","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7681","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.7716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01009","scoring_system":"epss","scoring_elements":"0.77126","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704","reference_id":"2314704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-27851"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5b-3vcj-7bav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66045?format=json","vulnerability_id":"VCID-ph63-r178-pfgg","summary":"webkitgtk: webkitgtk: Use-after-free due to improper memory management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43529","reference_id":"","reference_type":"","scores":[{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31077","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35936","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35911","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37564","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37525","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37602","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39005","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43867","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43849","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423166","reference_id":"2423166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43529"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66450?format=json","vulnerability_id":"VCID-pwqw-z8jj-abfs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12161","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13044","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19053","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19089","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19192","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19171","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1918","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19027","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18989","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19088","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19628","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336","reference_id":"2416336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43440"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61835?format=json","vulnerability_id":"VCID-pyek-9fpp-nudy","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40866","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25704","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25465","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28715","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30447","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30372","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30394","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30462","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30439","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724","reference_id":"2312724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7079-1/","reference_id":"USN-7079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7079-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40866"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33714?format=json","vulnerability_id":"VCID-q1rs-zvcq-9kbd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37450","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16919","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16862","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16864","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16783","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16739","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1661","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16728","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16834","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16798","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17055","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223000","reference_id":"2223000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223000"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213826","reference_id":"HT213826","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213826"},{"reference_url":"https://support.apple.com/en-us/HT213841","reference_id":"HT213841","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213841"},{"reference_url":"https://support.apple.com/en-us/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213843"},{"reference_url":"https://support.apple.com/en-us/HT213846","reference_id":"HT213846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213846"},{"reference_url":"https://support.apple.com/en-us/HT213848","reference_id":"HT213848","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/"}],"url":"https://support.apple.com/en-us/HT213848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-37450"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q1rs-zvcq-9kbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74670?format=json","vulnerability_id":"VCID-q3jv-e392-5fef","summary":"webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40780","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25195","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31515","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31538","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31608","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31606","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31597","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34039","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069","reference_id":"2302069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40780"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q3jv-e392-5fef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74672?format=json","vulnerability_id":"VCID-qvy2-8161-eycu","summary":"webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40782","reference_id":"","reference_type":"","scores":[{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.6002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60059","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62134","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62125","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.67287","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.6726","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.67284","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.67238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.67345","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.6724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.67249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00529","scoring_system":"epss","scoring_elements":"0.67209","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6778","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071","reference_id":"2302071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40782"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvy2-8161-eycu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66448?format=json","vulnerability_id":"VCID-qytm-81jk-muhc","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14785","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14706","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14575","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14664","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14662","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14944","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334","reference_id":"2416334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43432"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47889?format=json","vulnerability_id":"VCID-r25x-h5yu-quc1","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42890","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60918","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60831","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60767","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60814","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60872","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60833","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6086","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/18/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/18/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254327","reference_id":"2254327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254327"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/6","reference_id":"6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/6"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/7","reference_id":"7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/7"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/9","reference_id":"9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/9"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://support.apple.com/en-us/HT214040","reference_id":"HT214040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214040"},{"reference_url":"https://support.apple.com/en-us/HT214041","reference_id":"HT214041","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/"}],"url":"https://support.apple.com/en-us/HT214041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42890"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r25x-h5yu-quc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61857?format=json","vulnerability_id":"VCID-r857-ke39-xug8","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43966","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43889","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46826","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4677","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46801","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4687","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46806","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274","reference_id":"2386274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43227"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33716?format=json","vulnerability_id":"VCID-r8td-qqvp-xbbd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38572","reference_id":"","reference_type":"","scores":[{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57006","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61668","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61666","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67365","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.6739","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67452","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67355","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67393","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67248","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231028","reference_id":"2231028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231028"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38572"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8td-qqvp-xbbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61850?format=json","vulnerability_id":"VCID-rj9q-8rw3-qbbn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49547","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49502","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4945","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49477","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.8031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.8034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80347","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80342","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01656","scoring_system":"epss","scoring_elements":"0.8216","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01656","scoring_system":"epss","scoring_elements":"0.82139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01656","scoring_system":"epss","scoring_elements":"0.82122","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01656","scoring_system":"epss","scoring_elements":"0.82118","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01656","scoring_system":"epss","scoring_elements":"0.82106","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918","reference_id":"2357918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24264"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78375?format=json","vulnerability_id":"VCID-rzcn-t1m2-xkb5","summary":"webkitgtk: remote attacker may be able to break out of the Web Content sandbox","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32409.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32409","reference_id":"","reference_type":"","scores":[{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49355","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49217","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49279","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49306","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49256","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49283","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50213","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55866","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5583","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56575","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56574","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32409"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209204","reference_id":"2209204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209204"},{"reference_url":"https://support.apple.com/en-us/HT213757","reference_id":"HT213757","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-01-27T22:14:51Z/"}],"url":"https://support.apple.com/en-us/HT213757"},{"reference_url":"https://support.apple.com/en-us/HT213758","reference_id":"HT213758","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-01-27T22:14:51Z/"}],"url":"https://support.apple.com/en-us/HT213758"},{"reference_url":"https://support.apple.com/en-us/HT213761","reference_id":"HT213761","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-01-27T22:14:51Z/"}],"url":"https://support.apple.com/en-us/HT213761"},{"reference_url":"https://support.apple.com/en-us/HT213762","reference_id":"HT213762","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-01-27T22:14:51Z/"}],"url":"https://support.apple.com/en-us/HT213762"},{"reference_url":"https://support.apple.com/en-us/HT213764","reference_id":"HT213764","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-01-27T22:14:51Z/"}],"url":"https://support.apple.com/en-us/HT213764"},{"reference_url":"https://support.apple.com/en-us/HT213842","reference_id":"HT213842","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-01-27T22:14:51Z/"}],"url":"https://support.apple.com/en-us/HT213842"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-32409"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzcn-t1m2-xkb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78308?format=json","vulnerability_id":"VCID-sby7-u527-fqfg","summary":"webkitgtk: memory corruption issue leading to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32435","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46152","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46127","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4603","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46093","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46112","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46052","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4608","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46194","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46256","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46253","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218626","reference_id":"2218626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218626"},{"reference_url":"https://support.apple.com/en-us/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213670"},{"reference_url":"https://support.apple.com/en-us/HT213671","reference_id":"HT213671","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213671"},{"reference_url":"https://support.apple.com/en-us/HT213676","reference_id":"HT213676","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213676"},{"reference_url":"https://support.apple.com/en-us/HT213811","reference_id":"HT213811","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/"}],"url":"https://support.apple.com/en-us/HT213811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-32435"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sby7-u527-fqfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66368?format=json","vulnerability_id":"VCID-stjs-xknd-zfgh","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14333","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14244","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1436","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14319","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27415","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27604","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857","reference_id":"2418857","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-66287","reference_id":"CVE-2025-66287","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-66287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"},{"reference_url":"https://webkitgtk.org/security/WSA-2025-0009.html","reference_id":"WSA-2025-0009.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://webkitgtk.org/security/WSA-2025-0009.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-66287"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64219?format=json","vulnerability_id":"VCID-t46t-rhgu-cbc1","summary":"webkitgtk: A website may be able to track users through Safari web extensions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20676","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10555","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16075","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15918","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16031","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16135","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16109","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16143","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16217","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16188","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16078","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20676"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448794","reference_id":"2448794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20676"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64213?format=json","vulnerability_id":"VCID-teue-y6qz-jyfw","summary":"webkitgtk: Processing maliciously crafted web content may disclose internal states of the app","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46299","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06086","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06061","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06398","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06472","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07866","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07937","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07889","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448788","reference_id":"2448788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-46299"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teue-y6qz-jyfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72701?format=json","vulnerability_id":"VCID-tqb3-nabh-tkeh","summary":"webkitgtk: data isolation bypass vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44309","reference_id":"","reference_type":"","scores":[{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72445","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72604","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72589","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72614","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72577","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01158","scoring_system":"epss","scoring_elements":"0.78526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.7956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79557","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.7954","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01309","scoring_system":"epss","scoring_elements":"0.79849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01309","scoring_system":"epss","scoring_elements":"0.79856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01309","scoring_system":"epss","scoring_elements":"0.7982","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121752","reference_id":"121752","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121752"},{"reference_url":"https://support.apple.com/en-us/121753","reference_id":"121753","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121753"},{"reference_url":"https://support.apple.com/en-us/121754","reference_id":"121754","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121754"},{"reference_url":"https://support.apple.com/en-us/121755","reference_id":"121755","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121755"},{"reference_url":"https://support.apple.com/en-us/121756","reference_id":"121756","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121756"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327927","reference_id":"2327927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10472","reference_id":"RHSA-2024:10472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10480","reference_id":"RHSA-2024:10480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10482","reference_id":"RHSA-2024:10482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10483","reference_id":"RHSA-2024:10483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10489","reference_id":"RHSA-2024:10489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10492","reference_id":"RHSA-2024:10492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10496","reference_id":"RHSA-2024:10496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10501","reference_id":"RHSA-2024:10501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7142-1/","reference_id":"USN-7142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-44309"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqb3-nabh-tkeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47471?format=json","vulnerability_id":"VCID-u1sp-38g8-xfan","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558","reference_id":"","reference_type":"","scores":[{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85149","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85115","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.851","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.84992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85104","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85084","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85059","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85043","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85036","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85014","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689","reference_id":"2279689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689"},{"reference_url":"https://issues.chromium.org/issues/337766133","reference_id":"337766133","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://issues.chromium.org/issues/337766133"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","reference_id":"BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","reference_id":"FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","reference_id":"stable-channel-update-for-desktop_7.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-4558"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66444?format=json","vulnerability_id":"VCID-u6k6-1hmc-tfaf","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19975","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19884","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19973","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19862","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19731","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19809","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19895","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19859","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20378","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329","reference_id":"2416329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43427"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61845?format=json","vulnerability_id":"VCID-u9g4-5f16-yqc9","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24209","reference_id":"","reference_type":"","scores":[{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68394","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68342","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68307","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68334","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.8551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.8553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85601","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85578","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85561","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85553","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85531","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85535","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85468","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85497","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87339","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122376","reference_id":"122376","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122376"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357911","reference_id":"2357911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357911"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24209"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64208?format=json","vulnerability_id":"VCID-unu1-sbnm-27bf","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20244","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20279","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20277","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20296","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20383","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20153","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20227","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783","reference_id":"2448783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43433"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47887?format=json","vulnerability_id":"VCID-uugz-x8q6-fbe4","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41993","reference_id":"","reference_type":"","scores":[{"value":"0.24165","scoring_system":"epss","scoring_elements":"0.96134","published_at":"2026-05-14T12:55:00Z"},{"value":"0.24165","scoring_system":"epss","scoring_elements":"0.96104","published_at":"2026-05-05T12:55:00Z"},{"value":"0.24165","scoring_system":"epss","scoring_elements":"0.9611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.24165","scoring_system":"epss","scoring_elements":"0.96113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.24165","scoring_system":"epss","scoring_elements":"0.96116","published_at":"2026-05-11T12:55:00Z"},{"value":"0.24165","scoring_system":"epss","scoring_elements":"0.96122","published_at":"2026-05-12T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96127","published_at":"2026-04-26T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96107","published_at":"2026-04-12T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96109","published_at":"2026-04-13T12:55:00Z"},{"value":"0.24414","scoring_system":"epss","scoring_elements":"0.96118","published_at":"2026-04-16T12:55:00Z"},{"value":"0.24891","scoring_system":"epss","scoring_elements":"0.96127","published_at":"2026-04-02T12:55:00Z"},{"value":"0.24891","scoring_system":"epss","scoring_elements":"0.96134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.24891","scoring_system":"epss","scoring_elements":"0.96139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.24891","scoring_system":"epss","scoring_elements":"0.9617","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240522","reference_id":"2240522","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240522"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213940","reference_id":"HT213940","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/"}],"url":"https://support.apple.com/en-us/HT213940"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0004/","reference_id":"ntap-20240426-0004","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6426-1/","reference_id":"USN-6426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6426-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-41993"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uugz-x8q6-fbe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73820?format=json","vulnerability_id":"VCID-v1he-6exf-b7dt","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27820","reference_id":"","reference_type":"","scores":[{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79784","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79746","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79737","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.7972","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79697","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79666","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79659","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79628","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79624","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.7959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698","reference_id":"2314698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-27820"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v1he-6exf-b7dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74465?format=json","vulnerability_id":"VCID-v937-hkz6-v3hc","summary":"webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to a cross site scripting attack","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40785.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40785.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40785","reference_id":"","reference_type":"","scores":[{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70613","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70585","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70615","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70542","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70568","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70569","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70522","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70665","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70485","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70424","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71068","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71012","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40785","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40785"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302068","reference_id":"2302068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302068"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/"}],"url":"https://support.apple.com/en-us/HT214124"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40785"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v937-hkz6-v3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41962?format=json","vulnerability_id":"VCID-vh6y-51ne-cuhh","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1745","reference_id":"","reference_type":"","scores":[{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74259","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74077","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74131","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.7414","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74168","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74196","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74218","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.7418","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00802","scoring_system":"epss","scoring_elements":"0.74203","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1030270","reference_id":"1030270","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://www.securitytracker.com/id/1030270"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270151","reference_id":"2270151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270151"},{"reference_url":"http://secunia.com/advisories/58920","reference_id":"58920","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://secunia.com/advisories/58920"},{"reference_url":"http://secunia.com/advisories/59155","reference_id":"59155","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://secunia.com/advisories/59155"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/02/05/8","reference_id":"8","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"reference_url":"https://src.chromium.org/viewvc/blink?revision=167993&view=revision","reference_id":"blink?revision=167993&view=revision","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"https://src.chromium.org/viewvc/blink?revision=167993&view=revision"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=346192","reference_id":"detail?id=346192","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"https://code.google.com/p/chromium/issues/detail?id=346192"},{"reference_url":"http://www.debian.org/security/2014/dsa-2939","reference_id":"dsa-2939","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://www.debian.org/security/2014/dsa-2939"},{"reference_url":"https://security.gentoo.org/glsa/201408-16","reference_id":"GLSA-201408-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-16"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html","reference_id":"msg00023.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html","reference_id":"stable-channel-update_20.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/"}],"url":"http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2014-1745"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh6y-51ne-cuhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68659?format=json","vulnerability_id":"VCID-vk4e-qufz-5ffp","summary":"angle: insufficient input validation can cause undefined behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44188","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4417","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44401","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55457","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55484","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55544","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254","reference_id":"2380254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254"},{"reference_url":"https://issues.chromium.org/issues/427162086","reference_id":"427162086","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://issues.chromium.org/issues/427162086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html","reference_id":"stable-channel-update-for-desktop_15.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-6558"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41974?format=json","vulnerability_id":"VCID-vqd7-gwyv-vfaf","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23254","reference_id":"","reference_type":"","scores":[{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62658","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62633","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62673","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62622","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62574","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62715","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66263","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/26/1","reference_id":"1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/26/1"},{"reference_url":"https://support.apple.com/en-us/120881","reference_id":"120881","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120881"},{"reference_url":"https://support.apple.com/en-us/120882","reference_id":"120882","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120882"},{"reference_url":"https://support.apple.com/en-us/120883","reference_id":"120883","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120883"},{"reference_url":"https://support.apple.com/en-us/120893","reference_id":"120893","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120893"},{"reference_url":"https://support.apple.com/en-us/120894","reference_id":"120894","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120894"},{"reference_url":"https://support.apple.com/en-us/120895","reference_id":"120895","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/120895"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/20","reference_id":"20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270289","reference_id":"2270289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270289"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/24","reference_id":"24","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/25","reference_id":"25","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Mar/26","reference_id":"26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Mar/26"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://support.apple.com/en-us/HT214081","reference_id":"HT214081","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214081"},{"reference_url":"https://support.apple.com/en-us/HT214084","reference_id":"HT214084","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214084"},{"reference_url":"https://support.apple.com/en-us/HT214086","reference_id":"HT214086","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214086"},{"reference_url":"https://support.apple.com/en-us/HT214087","reference_id":"HT214087","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214087"},{"reference_url":"https://support.apple.com/en-us/HT214088","reference_id":"HT214088","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214088"},{"reference_url":"https://support.apple.com/en-us/HT214089","reference_id":"HT214089","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://support.apple.com/en-us/HT214089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/","reference_id":"IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6732-1/","reference_id":"USN-6732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23254"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqd7-gwyv-vfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33718?format=json","vulnerability_id":"VCID-vt3f-hrb1-33cw","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38594","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63069","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64279","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64177","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64145","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64188","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64234","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64201","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64227","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67011","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68043","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68086","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231018","reference_id":"2231018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231018"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38594"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3f-hrb1-33cw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33719?format=json","vulnerability_id":"VCID-vwaa-vyn9-d3ey","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38595","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69872","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71273","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77009","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77025","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77076","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77022","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77003","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76836","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231019","reference_id":"2231019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2231019"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6289-1/","reference_id":"USN-6289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6289-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-38595"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwaa-vyn9-d3ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66441?format=json","vulnerability_id":"VCID-w3r3-11kt-2ydu","summary":"webkitgtk: A website may exfiltrate image data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12346","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12488","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12367","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12452","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12479","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12543","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12365","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12392","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12458","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325","reference_id":"2416325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43392"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64218?format=json","vulnerability_id":"VCID-w5gq-k53s-tuc5","summary":"webkitgtk: A remote attacker may be able to cause a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20652","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48838","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4878","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48695","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48757","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48785","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48731","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48762","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448793","reference_id":"2448793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20652"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71952?format=json","vulnerability_id":"VCID-wbn4-ea3w-k7f3","summary":"webkitgtk: Processing web content may lead to a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24158","reference_id":"","reference_type":"","scores":[{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.74985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75208","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75062","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75069","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75102","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75106","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75114","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75141","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75165","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75146","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75155","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75036","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344623","reference_id":"2344623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2025-24158"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67449?format=json","vulnerability_id":"VCID-whma-xbxr-5uay","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43342","reference_id":"","reference_type":"","scores":[{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52355","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56122","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62584","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62591","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62672","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62586","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62537","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62637","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125109","reference_id":"125109","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125109"},{"reference_url":"https://support.apple.com/en-us/125110","reference_id":"125110","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125110"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397627","reference_id":"2397627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43342"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77907?format=json","vulnerability_id":"VCID-wn9z-vusf-yycn","summary":"webkitgtk: processing a malicious image may lead to a denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42883","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0589","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05643","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05712","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05727","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05803","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05869","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05883","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05885","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05954","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0597","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/18/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/18/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254326","reference_id":"2254326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254326"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/6","reference_id":"6","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/6"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/7","reference_id":"7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/7"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/8","reference_id":"8","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/9","reference_id":"9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/9"},{"reference_url":"https://www.debian.org/security/2023/dsa-5580","reference_id":"dsa-5580","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://www.debian.org/security/2023/dsa-5580"},{"reference_url":"https://support.apple.com/en-us/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214034"},{"reference_url":"https://support.apple.com/kb/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/kb/HT214034"},{"reference_url":"https://support.apple.com/en-us/HT214035","reference_id":"HT214035","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214035"},{"reference_url":"https://support.apple.com/en-us/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214036"},{"reference_url":"https://support.apple.com/en-us/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214039"},{"reference_url":"https://support.apple.com/kb/HT214039","reference_id":"HT214039","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/kb/HT214039"},{"reference_url":"https://support.apple.com/en-us/HT214040","reference_id":"HT214040","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214040"},{"reference_url":"https://support.apple.com/en-us/HT214041","reference_id":"HT214041","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/"}],"url":"https://support.apple.com/en-us/HT214041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6582-1/","reference_id":"USN-6582-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6582-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42883"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wn9z-vusf-yycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61854?format=json","vulnerability_id":"VCID-wnxh-854z-ykfk","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04965","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06144","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07114","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07268","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0735","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07331","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07346","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07383","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270","reference_id":"2386270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43211"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64211?format=json","vulnerability_id":"VCID-wrt4-z8ne-zffm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43457","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09336","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21313","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2139","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24431","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24233","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24291","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24229","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24738","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448786","reference_id":"2448786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43457"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47883?format=json","vulnerability_id":"VCID-x25m-k9px-2ubs","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39928","reference_id":"","reference_type":"","scores":[{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38957","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38971","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38945","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38965","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38864","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38699","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38587","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38465","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38539","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38551","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38489","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38562","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241400","reference_id":"2241400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241400"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6426-1/","reference_id":"USN-6426-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6426-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-39928"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x25m-k9px-2ubs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64207?format=json","vulnerability_id":"VCID-x5sh-5xtn-r7cp","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43214","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4448","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57723","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59506","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62178","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62116","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62165","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62223","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64175","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448782","reference_id":"2448782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43214"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47888?format=json","vulnerability_id":"VCID-x73g-k7yh-qydd","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42852","reference_id":"","reference_type":"","scores":[{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84495","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84463","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84447","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84448","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84431","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84406","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84388","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84344","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84343","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84332","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84309","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84287","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/15/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/15/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/19","reference_id":"19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/22","reference_id":"22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/22"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271456","reference_id":"2271456","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271456"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/23","reference_id":"23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/23"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/24","reference_id":"24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/24"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/25","reference_id":"25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/25"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/27"},{"reference_url":"https://www.debian.org/security/2023/dsa-5557","reference_id":"dsa-5557","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://www.debian.org/security/2023/dsa-5557"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213981","reference_id":"HT213981","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213981"},{"reference_url":"https://support.apple.com/en-us/HT213982","reference_id":"HT213982","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213982"},{"reference_url":"https://support.apple.com/en-us/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213984"},{"reference_url":"https://support.apple.com/kb/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/kb/HT213984"},{"reference_url":"https://support.apple.com/en-us/HT213986","reference_id":"HT213986","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213986"},{"reference_url":"https://support.apple.com/en-us/HT213987","reference_id":"HT213987","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213987"},{"reference_url":"https://support.apple.com/en-us/HT213988","reference_id":"HT213988","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","reference_id":"RPPMOWFYZODONTA3RLZOKSGNR4DELGG2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","reference_id":"S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/"},{"reference_url":"https://usn.ubuntu.com/6490-1/","reference_id":"USN-6490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6490-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","reference_id":"ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-42852"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x73g-k7yh-qydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64210?format=json","vulnerability_id":"VCID-xpp8-357g-c7gp","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1502","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15103","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15147","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785","reference_id":"2448785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43441"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33724?format=json","vulnerability_id":"VCID-xqyu-yhx3-f7fq","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397","reference_id":"","reference_type":"","scores":[{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78875","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78935","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78952","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78967","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78989","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79003","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.79054","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945","reference_id":"2238945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-40397"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqyu-yhx3-f7fq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66431?format=json","vulnerability_id":"VCID-xr5y-1ebg-xqcj","summary":"webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22574","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2848","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28557","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28538","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28517","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28456","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2846","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29702","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300","reference_id":"2416300","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13502","reference_id":"CVE-2025-13502","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=302218","reference_id":"show_bug.cgi?id=302218","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://bugs.webkit.org/show_bug.cgi?id=302218"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-13502"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72612?format=json","vulnerability_id":"VCID-y388-97uu-3qax","summary":"webkit: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54534","reference_id":"","reference_type":"","scores":[{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77729","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78063","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80886","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80891","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80904","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80946","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80847","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80869","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333846","reference_id":"2333846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333846"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-54534"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y388-97uu-3qax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74671?format=json","vulnerability_id":"VCID-y77v-hwy6-hfhy","summary":"webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40779","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11235","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11224","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11159","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11289","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11192","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11162","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11024","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11592","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11545","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070","reference_id":"2302070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-40779"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y77v-hwy6-hfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41972?format=json","vulnerability_id":"VCID-ya13-9pc8-n3ht","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23222","reference_id":"","reference_type":"","scores":[{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.6832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69682","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69637","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69608","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69633","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69723","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69709","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69735","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70706","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74895","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/118479","reference_id":"118479","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/118479"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120305","reference_id":"120305","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120305"},{"reference_url":"https://support.apple.com/en-us/120307","reference_id":"120307","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120307"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120310","reference_id":"120310","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120310"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259893","reference_id":"2259893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259893"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6631-1/","reference_id":"USN-6631-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6631-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23222"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ya13-9pc8-n3ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73818?format=json","vulnerability_id":"VCID-ydxt-4h1z-1kh8","summary":"webkitgtk: A malicious website may cause unexpected cross-origin behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23271","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20254","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2455","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24542","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26147","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26098","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26277","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26246","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2622","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26164","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2688","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23271"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120306","reference_id":"120306","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120306"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314696","reference_id":"2314696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314696"},{"reference_url":"https://support.apple.com/en-us/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214055"},{"reference_url":"https://support.apple.com/kb/HT214055","reference_id":"HT214055","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214055"},{"reference_url":"https://support.apple.com/en-us/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214056"},{"reference_url":"https://support.apple.com/kb/HT214056","reference_id":"HT214056","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214056"},{"reference_url":"https://support.apple.com/en-us/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214059"},{"reference_url":"https://support.apple.com/kb/HT214059","reference_id":"HT214059","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214059"},{"reference_url":"https://support.apple.com/en-us/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214060"},{"reference_url":"https://support.apple.com/kb/HT214060","reference_id":"HT214060","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214060"},{"reference_url":"https://support.apple.com/en-us/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/en-us/HT214061"},{"reference_url":"https://support.apple.com/kb/HT214061","reference_id":"HT214061","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/"}],"url":"https://support.apple.com/kb/HT214061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2024-23271"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydxt-4h1z-1kh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64214?format=json","vulnerability_id":"VCID-yfww-r9rn-73dy","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20608","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02495","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02461","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06619","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06372","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06333","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06506","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06581","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06592","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06603","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448789","reference_id":"2448789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20608"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61853?format=json","vulnerability_id":"VCID-yg6b-hsst-ckaa","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34464","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.3441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34449","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36253","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36156","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36256","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36342","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36179","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36241","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269","reference_id":"2386269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31278"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33713?format=json","vulnerability_id":"VCID-ytw3-vz3r-rqdd","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32439","reference_id":"","reference_type":"","scores":[{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78773","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.7859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78611","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78642","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.7865","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78666","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78683","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78707","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78723","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78719","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78735","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78557","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0116","scoring_system":"epss","scoring_elements":"0.78584","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32439"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218640","reference_id":"2218640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218640"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT213811","reference_id":"HT213811","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213811"},{"reference_url":"https://support.apple.com/en-us/HT213813","reference_id":"HT213813","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213813"},{"reference_url":"https://support.apple.com/en-us/HT213814","reference_id":"HT213814","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213814"},{"reference_url":"https://support.apple.com/kb/HT213814","reference_id":"HT213814","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/kb/HT213814"},{"reference_url":"https://support.apple.com/en-us/HT213816","reference_id":"HT213816","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/en-us/HT213816"},{"reference_url":"https://support.apple.com/kb/HT213816","reference_id":"HT213816","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/"}],"url":"https://support.apple.com/kb/HT213816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6264-1/","reference_id":"USN-6264-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6264-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994456?format=json","purl":"pkg:deb/debian/wpewebkit@2.48.3-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vsk-e1mf-6uaz"},{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-2hr6-uu49-1qb7"},{"vulnerability":"VCID-2pgr-9muu-s3ge"},{"vulnerability":"VCID-3k6e-zz11-93bn"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-5q44-vqhn-zydx"},{"vulnerability":"VCID-76jg-y2sa-f7cu"},{"vulnerability":"VCID-7j7p-hnbd-hudk"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-ahcu-937r-57fu"},{"vulnerability":"VCID-aqvh-emss-bufx"},{"vulnerability":"VCID-az2z-2mnu-sfbh"},{"vulnerability":"VCID-bjtx-twmy-jbgk"},{"vulnerability":"VCID-dvx9-km9t-yqfv"},{"vulnerability":"VCID-ednn-ppw1-myfk"},{"vulnerability":"VCID-ems1-41u6-vbex"},{"vulnerability":"VCID-epzj-t14z-43d2"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqjq-p4re-gkf6"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-gwt6-n8ue-mqcf"},{"vulnerability":"VCID-hvj6-wsg9-1bhg"},{"vulnerability":"VCID-j31g-7h17-27c8"},{"vulnerability":"VCID-jbuw-yp7v-4fcz"},{"vulnerability":"VCID-jyw2-fu8s-3fha"},{"vulnerability":"VCID-kx6w-wbua-5ffr"},{"vulnerability":"VCID-m59e-8bgm-77he"},{"vulnerability":"VCID-mfg4-2ma4-3qgj"},{"vulnerability":"VCID-mhfm-j5xm-wybd"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nmvc-maj7-rfhm"},{"vulnerability":"VCID-nu9v-3xak-77aw"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-p84d-5ze6-9fb5"},{"vulnerability":"VCID-ph63-r178-pfgg"},{"vulnerability":"VCID-pwqw-z8jj-abfs"},{"vulnerability":"VCID-qytm-81jk-muhc"},{"vulnerability":"VCID-r857-ke39-xug8"},{"vulnerability":"VCID-stjs-xknd-zfgh"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-u6k6-1hmc-tfaf"},{"vulnerability":"VCID-unu1-sbnm-27bf"},{"vulnerability":"VCID-vk4e-qufz-5ffp"},{"vulnerability":"VCID-w3r3-11kt-2ydu"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-whma-xbxr-5uay"},{"vulnerability":"VCID-wnxh-854z-ykfk"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-xpp8-357g-c7gp"},{"vulnerability":"VCID-xr5y-1ebg-xqcj"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-yg6b-hsst-ckaa"},{"vulnerability":"VCID-z7hw-fywx-dffc"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1"}],"aliases":["CVE-2023-32439"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ytw3-vz3r-rqdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65879?format=json","vulnerability_id":"VCID-z7hw-fywx-dffc","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43535","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14379","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14238","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14389","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14482","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14523","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14606","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423188","reference_id":"2423188","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43535"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63945?format=json","vulnerability_id":"VCID-zk2j-9hd2-hfcn","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28857","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12564","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12498","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12556","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12553","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12578","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12643","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453004","reference_id":"2453004","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14659","reference_id":"RHSA-2026:14659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16056","reference_id":"RHSA-2026:16056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:16695","reference_id":"RHSA-2026:16695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:16695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"},{"reference_url":"https://usn.ubuntu.com/8237-1/","reference_id":"USN-8237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28857"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zk2j-9hd2-hfcn"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.38.6-1"}