Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
Typedeb
Namespacedebian
Namewebkit2gtk
Version2.50.4-1~deb12u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.50.6-1~deb12u1
Latest_non_vulnerable_version2.52.1-1
Affected_by_vulnerabilities
0
url VCID-25ng-4kwb-qfat
vulnerability_id VCID-25ng-4kwb-qfat
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20636
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12694
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12561
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12549
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12628
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.1268
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12648
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12606
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126348
6
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126353
7
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126354
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448791
reference_id 2448791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448791
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20636
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat
1
url VCID-4k57-k2s6-wkhx
vulnerability_id VCID-4k57-k2s6-wkhx
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20644
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1368
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13559
published_at 2026-04-13T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13741
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13542
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13623
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13674
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13644
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13607
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20644
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448792
reference_id 2448792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448792
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20644
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx
2
url VCID-7ut5-fu6w-63fs
vulnerability_id VCID-7ut5-fu6w-63fs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43213
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-02T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31173
published_at 2026-04-13T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31353
published_at 2026-04-04T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31172
published_at 2026-04-07T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31225
published_at 2026-04-08T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31256
published_at 2026-04-09T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.3126
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31216
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448781
reference_id 2448781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448781
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs
3
url VCID-88kv-qter-5fc3
vulnerability_id VCID-88kv-qter-5fc3
summary webkitgtk: A malicious website may be able to access script message handlers intended for other origins
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28861
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10489
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10448
published_at 2026-04-02T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10517
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10377
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.1045
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10514
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10544
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10511
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126793
6
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126794
7
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126799
8
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126800
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453007
reference_id 2453007
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453007
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-28861
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88kv-qter-5fc3
4
url VCID-8cxd-4p9j-dyf1
vulnerability_id VCID-8cxd-4p9j-dyf1
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20664
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11507
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11433
published_at 2026-04-13T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11561
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11348
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11432
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11489
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11495
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11462
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126799
7
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453001
reference_id 2453001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453001
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-20664
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cxd-4p9j-dyf1
5
url VCID-988h-sqnj-57fg
vulnerability_id VCID-988h-sqnj-57fg
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43511
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19277
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-12T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19184
published_at 2026-04-11T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19178
published_at 2026-04-09T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19125
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1933
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19045
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24919
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125633
5
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125884
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125890
8
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125891
9
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125892
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448787
reference_id 2448787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448787
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43511
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg
6
url VCID-eu4s-vvyf-pqh3
vulnerability_id VCID-eu4s-vvyf-pqh3
summary webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28871
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10075
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10149
published_at 2026-04-13T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10135
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10032
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10108
published_at 2026-04-08T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10169
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10209
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126793
6
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126794
7
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453008
reference_id 2453008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453008
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-28871
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eu4s-vvyf-pqh3
7
url VCID-ffha-wafn-sqa9
vulnerability_id VCID-ffha-wafn-sqa9
summary webkitgtk: A malicious website may be able to process restricted web content outside the sandbox
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28859
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.12006
published_at 2026-04-02T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11933
published_at 2026-04-13T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.1205
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11853
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11936
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11988
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11996
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11959
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126797
reference_id 126797
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126797
7
reference_url https://support.apple.com/en-us/126798
reference_id 126798
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126798
8
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126799
9
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126800
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453006
reference_id 2453006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453006
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-28859
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ffha-wafn-sqa9
8
url VCID-fpvs-seby-kfhv
vulnerability_id VCID-fpvs-seby-kfhv
summary webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20691
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10448
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10489
published_at 2026-04-13T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10517
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10377
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.1045
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10514
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10544
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10511
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126798
reference_id 126798
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126798
7
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126799
8
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126800
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453003
reference_id 2453003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453003
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-20691
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpvs-seby-kfhv
9
url VCID-gqm2-5nh3-7ufp
vulnerability_id VCID-gqm2-5nh3-7ufp
summary webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20665
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.3659
published_at 2026-04-02T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.36479
published_at 2026-04-13T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36623
published_at 2026-04-04T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36459
published_at 2026-04-07T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36511
published_at 2026-04-08T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.3653
published_at 2026-04-09T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36537
published_at 2026-04-11T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36502
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126793
6
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126794
7
reference_url https://support.apple.com/en-us/126797
reference_id 126797
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126797
8
reference_url https://support.apple.com/en-us/126798
reference_id 126798
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126798
9
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126799
10
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126800
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453002
reference_id 2453002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453002
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-20665
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm2-5nh3-7ufp
10
url VCID-mmcp-4qnx-5ufh
vulnerability_id VCID-mmcp-4qnx-5ufh
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20635
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15424
published_at 2026-04-02T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15291
published_at 2026-04-13T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15493
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15297
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15385
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15435
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15396
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15357
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126351
reference_id 126351
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126351
8
reference_url https://support.apple.com/en-us/126352
reference_id 126352
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126352
9
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126353
10
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126354
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448790
reference_id 2448790
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448790
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20635
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh
11
url VCID-nwkr-s7vs-p7fz
vulnerability_id VCID-nwkr-s7vs-p7fz
summary webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20643
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09744
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09771
published_at 2026-04-13T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09793
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09689
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.0976
published_at 2026-04-08T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.0981
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.0982
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09788
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126604
reference_id 126604
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126604
5
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126792
6
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126793
7
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126794
8
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126799
9
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126800
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453000
reference_id 2453000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453000
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-20643
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwkr-s7vs-p7fz
12
url VCID-t46t-rhgu-cbc1
vulnerability_id VCID-t46t-rhgu-cbc1
summary webkitgtk: A website may be able to track users through Safari web extensions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20676
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10683
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10606
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10679
published_at 2026-04-08T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10735
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10749
published_at 2026-04-11T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10718
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20676
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126348
6
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126353
7
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126354
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448794
reference_id 2448794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448794
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20676
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1
13
url VCID-teue-y6qz-jyfw
vulnerability_id VCID-teue-y6qz-jyfw
summary webkitgtk: Processing maliciously crafted web content may disclose internal states of the app
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-46299
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.0601
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06086
published_at 2026-04-13T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06046
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.0603
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0607
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06109
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.061
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06094
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-46299
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125886
6
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125889
7
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125890
8
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125891
9
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125892
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448788
reference_id 2448788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448788
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2025-46299
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-teue-y6qz-jyfw
14
url VCID-w5gq-k53s-tuc5
vulnerability_id VCID-w5gq-k53s-tuc5
summary webkitgtk: A remote attacker may be able to cause a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20652
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.38025
published_at 2026-04-02T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37947
published_at 2026-04-13T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38051
published_at 2026-04-04T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.3793
published_at 2026-04-07T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37981
published_at 2026-04-08T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37992
published_at 2026-04-09T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.38009
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37972
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20652
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448793
reference_id 2448793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448793
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20652
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5
15
url VCID-wrt4-z8ne-zffm
vulnerability_id VCID-wrt4-z8ne-zffm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43457
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08959
published_at 2026-04-13T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08968
published_at 2026-04-04T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08899
published_at 2026-04-07T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08977
published_at 2026-04-08T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.09009
published_at 2026-04-11T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08972
published_at 2026-04-12T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125638
7
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125639
8
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125640
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448786
reference_id 2448786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448786
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43457
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm
16
url VCID-x5sh-5xtn-r7cp
vulnerability_id VCID-x5sh-5xtn-r7cp
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43214
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.3515
published_at 2026-04-02T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.3696
published_at 2026-04-13T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37121
published_at 2026-04-04T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36948
published_at 2026-04-07T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.36999
published_at 2026-04-08T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37013
published_at 2026-04-09T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37021
published_at 2026-04-11T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36986
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448782
reference_id 2448782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448782
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43214
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp
17
url VCID-yfww-r9rn-73dy
vulnerability_id VCID-yfww-r9rn-73dy
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20608
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02479
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02478
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02491
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02495
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02515
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.0248
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448789
reference_id 2448789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448789
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20608
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy
18
url VCID-zk2j-9hd2-hfcn
vulnerability_id VCID-zk2j-9hd2-hfcn
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28857
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11507
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11434
published_at 2026-04-13T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11561
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11349
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11433
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.1149
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11496
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11463
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28857
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126799
7
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453004
reference_id 2453004
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453004
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
1
url pkg:deb/debian/webkit2gtk@2.52.1-1
purl pkg:deb/debian/webkit2gtk@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1
aliases CVE-2026-28857
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zk2j-9hd2-hfcn
Fixing_vulnerabilities
0
url VCID-1vsk-e1mf-6uaz
vulnerability_id VCID-1vsk-e1mf-6uaz
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28385
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29857
published_at 2026-04-13T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30035
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29849
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29948
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29953
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29906
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
reference_id 2386273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz
1
url VCID-1xcs-fpk3-nyg4
vulnerability_id VCID-1xcs-fpk3-nyg4
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67584
published_at 2026-04-13T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67543
published_at 2026-04-02T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.67564
published_at 2026-04-04T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67542
published_at 2026-04-07T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-08T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67607
published_at 2026-04-09T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.6763
published_at 2026-04-11T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
reference_id 2314706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44187
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4
2
url VCID-23pb-y6g6-sbed
vulnerability_id VCID-23pb-y6g6-sbed
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24189
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75799
published_at 2026-04-02T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75852
published_at 2026-04-13T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75831
published_at 2026-04-04T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.75809
published_at 2026-04-07T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75842
published_at 2026-04-08T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75854
published_at 2026-04-09T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75877
published_at 2026-04-11T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75859
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386267
reference_id 2386267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386267
11
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
12
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
13
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
14
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
15
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
16
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
17
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
18
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
19
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24189
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23pb-y6g6-sbed
3
url VCID-2hr6-uu49-1qb7
vulnerability_id VCID-2hr6-uu49-1qb7
summary webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13947
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17412
published_at 2026-04-02T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22368
published_at 2026-04-13T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-09T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22464
published_at 2026-04-11T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22423
published_at 2026-04-12T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22519
published_at 2026-04-04T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22307
published_at 2026-04-07T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22388
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418576
reference_id 2418576
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2418576
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-13947
reference_id CVE-2025-13947
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/security/cve/CVE-2025-13947
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23743
34
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-13947
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7
4
url VCID-2nmg-6jk2-ebcb
vulnerability_id VCID-2nmg-6jk2-ebcb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71183
published_at 2026-04-13T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71143
published_at 2026-04-02T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71161
published_at 2026-04-04T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-07T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71178
published_at 2026-04-08T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-09T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71214
published_at 2026-04-11T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.712
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121567
reference_id 121567
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121567
9
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121569
10
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121571
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
reference_id 2323289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44296
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb
5
url VCID-2pgr-9muu-s3ge
vulnerability_id VCID-2pgr-9muu-s3ge
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43443
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14982
published_at 2026-04-13T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15169
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.14973
published_at 2026-04-07T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15061
published_at 2026-04-08T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15114
published_at 2026-04-09T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15081
published_at 2026-04-11T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15043
published_at 2026-04-12T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16305
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416337
reference_id 2416337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416337
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43443
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge
6
url VCID-2rm2-f5xj-1bb2
vulnerability_id VCID-2rm2-f5xj-1bb2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
reference_id
reference_type
scores
0
value 0.00315
scoring_system epss
scoring_elements 0.54584
published_at 2026-04-02T12:55:00Z
1
value 0.00315
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-13T12:55:00Z
2
value 0.00315
scoring_system epss
scoring_elements 0.54577
published_at 2026-04-07T12:55:00Z
3
value 0.00315
scoring_system epss
scoring_elements 0.54629
published_at 2026-04-08T12:55:00Z
4
value 0.00315
scoring_system epss
scoring_elements 0.54623
published_at 2026-04-09T12:55:00Z
5
value 0.00315
scoring_system epss
scoring_elements 0.54636
published_at 2026-04-11T12:55:00Z
6
value 0.00315
scoring_system epss
scoring_elements 0.54619
published_at 2026-04-12T12:55:00Z
7
value 0.00315
scoring_system epss
scoring_elements 0.54608
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122379
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
reference_id 2357910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
10
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
11
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
12
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
13
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
14
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
15
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
16
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
17
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
18
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24208
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2
7
url VCID-2vtf-gudd-9fah
vulnerability_id VCID-2vtf-gudd-9fah
summary WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71986
published_at 2026-04-13T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71966
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71994
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72001
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
reference_id 2333841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54479
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah
8
url VCID-3daw-8nh6-dfcq
vulnerability_id VCID-3daw-8nh6-dfcq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.1148
published_at 2026-04-13T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11549
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11603
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11392
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11476
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11535
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11545
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11511
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
reference_id 2323263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44185
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq
9
url VCID-3frv-ppjt-9bdy
vulnerability_id VCID-3frv-ppjt-9bdy
summary webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24143
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32688
published_at 2026-04-02T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32555
published_at 2026-04-13T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32723
published_at 2026-04-04T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32544
published_at 2026-04-07T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32592
published_at 2026-04-08T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32618
published_at 2026-04-09T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.3262
published_at 2026-04-11T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32581
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24143
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122073
7
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122074
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344621
reference_id 2344621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344621
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
11
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
12
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24143
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3frv-ppjt-9bdy
10
url VCID-3k6e-zz11-93bn
vulnerability_id VCID-3k6e-zz11-93bn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26463
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.2833
published_at 2026-04-13T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28524
published_at 2026-04-04T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28318
published_at 2026-04-07T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-08T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28427
published_at 2026-04-09T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28431
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28387
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
reference_id 2386268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31273
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn
11
url VCID-5q44-vqhn-zydx
vulnerability_id VCID-5q44-vqhn-zydx
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24845
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-13T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26334
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26106
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26173
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26221
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26229
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
reference_id 2386271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43212
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx
12
url VCID-5x1k-uam9-5bhs
vulnerability_id VCID-5x1k-uam9-5bhs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24162
reference_id
reference_type
scores
0
value 0.01179
scoring_system epss
scoring_elements 0.78697
published_at 2026-04-02T12:55:00Z
1
value 0.01179
scoring_system epss
scoring_elements 0.78741
published_at 2026-04-13T12:55:00Z
2
value 0.01179
scoring_system epss
scoring_elements 0.78728
published_at 2026-04-04T12:55:00Z
3
value 0.01179
scoring_system epss
scoring_elements 0.7871
published_at 2026-04-07T12:55:00Z
4
value 0.01179
scoring_system epss
scoring_elements 0.78735
published_at 2026-04-08T12:55:00Z
5
value 0.01179
scoring_system epss
scoring_elements 0.78742
published_at 2026-04-09T12:55:00Z
6
value 0.01179
scoring_system epss
scoring_elements 0.78766
published_at 2026-04-11T12:55:00Z
7
value 0.01179
scoring_system epss
scoring_elements 0.78749
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344624
reference_id 2344624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344624
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://access.redhat.com/errata/RHSA-2025:1957
reference_id RHSA-2025:1957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1957
13
reference_url https://access.redhat.com/errata/RHSA-2025:1958
reference_id RHSA-2025:1958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1958
14
reference_url https://access.redhat.com/errata/RHSA-2025:1959
reference_id RHSA-2025:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1959
15
reference_url https://access.redhat.com/errata/RHSA-2025:1960
reference_id RHSA-2025:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1960
16
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
17
reference_url https://access.redhat.com/errata/RHSA-2025:2035
reference_id RHSA-2025:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2035
18
reference_url https://access.redhat.com/errata/RHSA-2025:2121
reference_id RHSA-2025:2121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2121
19
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
20
reference_url https://access.redhat.com/errata/RHSA-2025:2126
reference_id RHSA-2025:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2126
21
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24162
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x1k-uam9-5bhs
13
url VCID-76jg-y2sa-f7cu
vulnerability_id VCID-76jg-y2sa-f7cu
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43501
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22817
published_at 2026-04-02T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-13T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22861
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22652
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22779
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22801
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22763
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43501
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423185
reference_id 2423185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423185
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43501
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu
14
url VCID-7gyr-mvmk-pfh9
vulnerability_id VCID-7gyr-mvmk-pfh9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40598
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40626
published_at 2026-04-11T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40607
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40547
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-04T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43206
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43221
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
reference_id 2353872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54467
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9
15
url VCID-7j7p-hnbd-hudk
vulnerability_id VCID-7j7p-hnbd-hudk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43429
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13604
published_at 2026-04-13T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13785
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13587
published_at 2026-04-07T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13667
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13719
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13689
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13653
published_at 2026-04-12T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14338
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416330
reference_id 2416330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416330
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43429
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk
16
url VCID-9j6k-np3x-23f7
vulnerability_id VCID-9j6k-np3x-23f7
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
reference_id
reference_type
scores
0
value 0.01383
scoring_system epss
scoring_elements 0.80301
published_at 2026-04-13T12:55:00Z
1
value 0.01383
scoring_system epss
scoring_elements 0.80278
published_at 2026-04-04T12:55:00Z
2
value 0.01383
scoring_system epss
scoring_elements 0.80266
published_at 2026-04-07T12:55:00Z
3
value 0.01383
scoring_system epss
scoring_elements 0.80293
published_at 2026-04-08T12:55:00Z
4
value 0.01383
scoring_system epss
scoring_elements 0.80304
published_at 2026-04-09T12:55:00Z
5
value 0.01383
scoring_system epss
scoring_elements 0.80323
published_at 2026-04-11T12:55:00Z
6
value 0.01383
scoring_system epss
scoring_elements 0.80308
published_at 2026-04-12T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
reference_id 2333845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54508
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7
17
url VCID-ahcu-937r-57fu
vulnerability_id VCID-ahcu-937r-57fu
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43430
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.2633
published_at 2026-04-13T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26528
published_at 2026-04-04T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26308
published_at 2026-04-07T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26376
published_at 2026-04-08T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26426
published_at 2026-04-09T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26434
published_at 2026-04-11T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26388
published_at 2026-04-12T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27201
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416331
reference_id 2416331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416331
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43430
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu
18
url VCID-aqvh-emss-bufx
vulnerability_id VCID-aqvh-emss-bufx
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43368
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14812
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14617
published_at 2026-04-07T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14706
published_at 2026-04-08T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14765
published_at 2026-04-09T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15105
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17153
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17106
published_at 2026-04-12T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17045
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/
url https://support.apple.com/en-us/125113
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397630
reference_id 2397630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397630
7
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
8
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
9
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
10
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
11
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
12
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
13
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
14
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
15
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
16
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
17
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
18
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43368
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx
19
url VCID-az2z-2mnu-sfbh
vulnerability_id VCID-az2z-2mnu-sfbh
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43419
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10526
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10546
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10411
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10484
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10552
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10581
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10548
published_at 2026-04-12T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11092
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125113
6
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125114
7
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125115
8
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125116
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416326
reference_id 2416326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416326
10
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
11
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
12
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
13
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
14
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
15
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
16
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
17
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
18
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
19
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43419
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh
20
url VCID-azef-hxum-z3eb
vulnerability_id VCID-azef-hxum-z3eb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-04T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23536
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24943
published_at 2026-04-12T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27125
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122281
reference_id 122281
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122281
5
reference_url https://support.apple.com/en-us/122283
reference_id 122283
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122283
6
reference_url https://support.apple.com/en-us/122284
reference_id 122284
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122284
7
reference_url https://support.apple.com/en-us/122285
reference_id 122285
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122285
8
reference_url https://support.apple.com/en-us/122345
reference_id 122345
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122345
9
reference_url https://support.apple.com/en-us/122346
reference_id 122346
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122346
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122372
11
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122376
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
reference_id 2351802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
13
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://access.redhat.com/errata/RHSA-2025:2863
reference_id RHSA-2025:2863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2863
16
reference_url https://access.redhat.com/errata/RHSA-2025:2864
reference_id RHSA-2025:2864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2864
17
reference_url https://access.redhat.com/errata/RHSA-2025:2997
reference_id RHSA-2025:2997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2997
18
reference_url https://access.redhat.com/errata/RHSA-2025:2998
reference_id RHSA-2025:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2998
19
reference_url https://access.redhat.com/errata/RHSA-2025:3000
reference_id RHSA-2025:3000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3000
20
reference_url https://access.redhat.com/errata/RHSA-2025:3001
reference_id RHSA-2025:3001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3001
21
reference_url https://access.redhat.com/errata/RHSA-2025:3002
reference_id RHSA-2025:3002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3002
22
reference_url https://access.redhat.com/errata/RHSA-2025:3005
reference_id RHSA-2025:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3005
23
reference_url https://access.redhat.com/errata/RHSA-2025:3034
reference_id RHSA-2025:3034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3034
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24201
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb
21
url VCID-b3dw-sj5b-5bhr
vulnerability_id VCID-b3dw-sj5b-5bhr
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
reference_id
reference_type
scores
0
value 0.05739
scoring_system epss
scoring_elements 0.9041
published_at 2026-04-02T12:55:00Z
1
value 0.07285
scoring_system epss
scoring_elements 0.9167
published_at 2026-04-12T12:55:00Z
2
value 0.07285
scoring_system epss
scoring_elements 0.91637
published_at 2026-04-04T12:55:00Z
3
value 0.07285
scoring_system epss
scoring_elements 0.91645
published_at 2026-04-07T12:55:00Z
4
value 0.07285
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-08T12:55:00Z
5
value 0.07285
scoring_system epss
scoring_elements 0.91664
published_at 2026-04-09T12:55:00Z
6
value 0.07285
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121846
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
reference_id 2333843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
11
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
12
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
13
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
14
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
15
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
16
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
17
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
18
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
19
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54502
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr
22
url VCID-b8ws-1k92-7bhq
vulnerability_id VCID-b8ws-1k92-7bhq
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33157
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-13T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.3473
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34607
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34651
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34683
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
reference_id 2344619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:1957
reference_id RHSA-2025:1957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1957
14
reference_url https://access.redhat.com/errata/RHSA-2025:1958
reference_id RHSA-2025:1958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1958
15
reference_url https://access.redhat.com/errata/RHSA-2025:1959
reference_id RHSA-2025:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1959
16
reference_url https://access.redhat.com/errata/RHSA-2025:1960
reference_id RHSA-2025:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1960
17
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
18
reference_url https://access.redhat.com/errata/RHSA-2025:2035
reference_id RHSA-2025:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2035
19
reference_url https://access.redhat.com/errata/RHSA-2025:2121
reference_id RHSA-2025:2121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2121
20
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
21
reference_url https://access.redhat.com/errata/RHSA-2025:2126
reference_id RHSA-2025:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2126
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54543
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq
23
url VCID-bjtx-twmy-jbgk
vulnerability_id VCID-bjtx-twmy-jbgk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43438
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448784
reference_id 2448784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448784
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43438
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk
24
url VCID-bkcz-d48v-7uca
vulnerability_id VCID-bkcz-d48v-7uca
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31973
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31846
published_at 2026-04-13T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.32016
published_at 2026-04-04T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31836
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31888
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31916
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31921
published_at 2026-04-11T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
reference_id 2357913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca
25
url VCID-c4np-b4zq-tkch
vulnerability_id VCID-c4np-b4zq-tkch
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
reference_id
reference_type
scores
0
value 0.00666
scoring_system epss
scoring_elements 0.71229
published_at 2026-04-13T12:55:00Z
1
value 0.00666
scoring_system epss
scoring_elements 0.71188
published_at 2026-04-02T12:55:00Z
2
value 0.00666
scoring_system epss
scoring_elements 0.71206
published_at 2026-04-04T12:55:00Z
3
value 0.00666
scoring_system epss
scoring_elements 0.71181
published_at 2026-04-07T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71223
published_at 2026-04-08T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71237
published_at 2026-04-09T12:55:00Z
6
value 0.00666
scoring_system epss
scoring_elements 0.7126
published_at 2026-04-11T12:55:00Z
7
value 0.00666
scoring_system epss
scoring_elements 0.71245
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
reference_id 2366500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31204
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch
26
url VCID-c9mb-24v2-q3ba
vulnerability_id VCID-c9mb-24v2-q3ba
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78251
published_at 2026-04-13T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-02T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78233
published_at 2026-04-04T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-07T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78242
published_at 2026-04-08T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78247
published_at 2026-04-09T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-11T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78256
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
reference_id 2366503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31215
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba
27
url VCID-cmdy-ztbw-jffq
vulnerability_id VCID-cmdy-ztbw-jffq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
reference_id
reference_type
scores
0
value 0.00504
scoring_system epss
scoring_elements 0.66155
published_at 2026-04-13T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66123
published_at 2026-04-02T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.6615
published_at 2026-04-04T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66118
published_at 2026-04-07T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66167
published_at 2026-04-08T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.6618
published_at 2026-04-09T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66199
published_at 2026-04-11T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66186
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
reference_id 2357909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54551
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq
28
url VCID-cw56-pdyr-fbge
vulnerability_id VCID-cw56-pdyr-fbge
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
reference_id
reference_type
scores
0
value 0.00821
scoring_system epss
scoring_elements 0.74363
published_at 2026-04-02T12:55:00Z
1
value 0.00821
scoring_system epss
scoring_elements 0.74405
published_at 2026-04-13T12:55:00Z
2
value 0.00821
scoring_system epss
scoring_elements 0.7439
published_at 2026-04-04T12:55:00Z
3
value 0.00821
scoring_system epss
scoring_elements 0.74364
published_at 2026-04-07T12:55:00Z
4
value 0.00821
scoring_system epss
scoring_elements 0.74397
published_at 2026-04-08T12:55:00Z
5
value 0.00821
scoring_system epss
scoring_elements 0.74412
published_at 2026-04-09T12:55:00Z
6
value 0.00821
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-11T12:55:00Z
7
value 0.00821
scoring_system epss
scoring_elements 0.74413
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
reference_id 2357917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge
29
url VCID-dd4q-8fs5-3kej
vulnerability_id VCID-dd4q-8fs5-3kej
summary webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44308
reference_id
reference_type
scores
0
value 0.01547
scoring_system epss
scoring_elements 0.81399
published_at 2026-04-13T12:55:00Z
1
value 0.01547
scoring_system epss
scoring_elements 0.81343
published_at 2026-04-02T12:55:00Z
2
value 0.01547
scoring_system epss
scoring_elements 0.81366
published_at 2026-04-04T12:55:00Z
3
value 0.01547
scoring_system epss
scoring_elements 0.81364
published_at 2026-04-07T12:55:00Z
4
value 0.01547
scoring_system epss
scoring_elements 0.81393
published_at 2026-04-08T12:55:00Z
5
value 0.01547
scoring_system epss
scoring_elements 0.81397
published_at 2026-04-09T12:55:00Z
6
value 0.01547
scoring_system epss
scoring_elements 0.81419
published_at 2026-04-11T12:55:00Z
7
value 0.01547
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121752
reference_id 121752
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121752
5
reference_url https://support.apple.com/en-us/121753
reference_id 121753
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121753
6
reference_url https://support.apple.com/en-us/121754
reference_id 121754
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121754
7
reference_url https://support.apple.com/en-us/121755
reference_id 121755
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121755
8
reference_url https://support.apple.com/en-us/121756
reference_id 121756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121756
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327931
reference_id 2327931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327931
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/7142-1/
reference_id USN-7142-1
reference_type
scores
url https://usn.ubuntu.com/7142-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44308
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dd4q-8fs5-3kej
30
url VCID-dvx9-km9t-yqfv
vulnerability_id VCID-dvx9-km9t-yqfv
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43531
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30817
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-13T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30865
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30683
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30742
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30774
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30777
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30733
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125889
8
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125890
9
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125891
10
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125892
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423187
reference_id 2423187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423187
12
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
13
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
14
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
15
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
16
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
17
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
18
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
19
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
20
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
21
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
22
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
23
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43531
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv
31
url VCID-ednn-ppw1-myfk
vulnerability_id VCID-ednn-ppw1-myfk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43272
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14693
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19667
published_at 2026-04-09T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19614
published_at 2026-04-08T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19534
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-13T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22086
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43272
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125113
6
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125115
7
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125116
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397626
reference_id 2397626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397626
9
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
10
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
11
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
12
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
13
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
14
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
15
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
16
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
17
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
18
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
19
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
20
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43272
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk
32
url VCID-ems1-41u6-vbex
vulnerability_id VCID-ems1-41u6-vbex
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43458
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21944
published_at 2026-04-13T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22117
published_at 2026-04-04T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.21892
published_at 2026-04-07T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21974
published_at 2026-04-08T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22029
published_at 2026-04-09T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-11T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22003
published_at 2026-04-12T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22678
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418855
reference_id 2418855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418855
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43458
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex
33
url VCID-epzj-t14z-43d2
vulnerability_id VCID-epzj-t14z-43d2
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43421
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08307
published_at 2026-04-13T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08327
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08272
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08336
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08353
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08344
published_at 2026-04-11T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08324
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08623
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125638
7
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125640
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416355
reference_id 2416355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416355
9
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
10
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
11
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
12
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
13
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
14
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
15
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
16
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
17
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
18
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
19
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
20
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43421
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2
34
url VCID-ey9n-zksh-mbfm
vulnerability_id VCID-ey9n-zksh-mbfm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.78151
published_at 2026-04-13T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-02T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-04T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.78116
published_at 2026-04-07T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78142
published_at 2026-04-08T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.78148
published_at 2026-04-09T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-11T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.78155
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
reference_id 2366502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31206
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm
35
url VCID-fzqz-yfn1-7yfd
vulnerability_id VCID-fzqz-yfn1-7yfd
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31257
reference_id
reference_type
scores
0
value 0.00799
scoring_system epss
scoring_elements 0.7403
published_at 2026-04-13T12:55:00Z
1
value 0.00799
scoring_system epss
scoring_elements 0.73989
published_at 2026-04-02T12:55:00Z
2
value 0.00799
scoring_system epss
scoring_elements 0.74015
published_at 2026-04-04T12:55:00Z
3
value 0.00799
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-07T12:55:00Z
4
value 0.00799
scoring_system epss
scoring_elements 0.7402
published_at 2026-04-08T12:55:00Z
5
value 0.00799
scoring_system epss
scoring_elements 0.74034
published_at 2026-04-09T12:55:00Z
6
value 0.00799
scoring_system epss
scoring_elements 0.74056
published_at 2026-04-11T12:55:00Z
7
value 0.00799
scoring_system epss
scoring_elements 0.74037
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31257
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366504
reference_id 2366504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366504
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://access.redhat.com/errata/RHSA-2025:7995
reference_id RHSA-2025:7995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7995
17
reference_url https://access.redhat.com/errata/RHSA-2025:8046
reference_id RHSA-2025:8046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8046
18
reference_url https://access.redhat.com/errata/RHSA-2025:8530
reference_id RHSA-2025:8530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8530
19
reference_url https://access.redhat.com/errata/RHSA-2025:8532
reference_id RHSA-2025:8532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8532
20
reference_url https://access.redhat.com/errata/RHSA-2025:8533
reference_id RHSA-2025:8533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8533
21
reference_url https://access.redhat.com/errata/RHSA-2025:8534
reference_id RHSA-2025:8534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8534
22
reference_url https://access.redhat.com/errata/RHSA-2025:8541
reference_id RHSA-2025:8541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8541
23
reference_url https://access.redhat.com/errata/RHSA-2025:8600
reference_id RHSA-2025:8600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8600
24
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31257
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd
36
url VCID-gqjq-p4re-gkf6
vulnerability_id VCID-gqjq-p4re-gkf6
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43425
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10285
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10283
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10179
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10253
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10315
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10345
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10304
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43425
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416327
reference_id 2416327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416327
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43425
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6
37
url VCID-gwt6-n8ue-mqcf
vulnerability_id VCID-gwt6-n8ue-mqcf
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31277
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.3912
published_at 2026-04-13T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39173
published_at 2026-04-04T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-07T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39147
published_at 2026-04-08T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-09T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39175
published_at 2026-04-11T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39139
published_at 2026-04-12T12:55:00Z
7
value 0.00192
scoring_system epss
scoring_elements 0.4111
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448780
reference_id 2448780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448780
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31277
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf
38
url VCID-hp6k-spzk-vbaa
vulnerability_id VCID-hp6k-spzk-vbaa
summary webkitgtk: Copying a URL from Web Inspector may lead to command injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24150
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53944
published_at 2026-04-02T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5401
published_at 2026-04-13T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53971
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53947
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53999
published_at 2026-04-08T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-09T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54045
published_at 2026-04-11T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54028
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122074
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344622
reference_id 2344622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344622
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
10
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
11
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24150
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp6k-spzk-vbaa
39
url VCID-hvj6-wsg9-1bhg
vulnerability_id VCID-hvj6-wsg9-1bhg
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04829
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.0543
published_at 2026-04-13T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05414
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05422
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05457
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05478
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.0545
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05436
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
reference_id 2386276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43265
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg
40
url VCID-j31g-7h17-27c8
vulnerability_id VCID-j31g-7h17-27c8
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43541
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13378
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13255
published_at 2026-04-13T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13443
published_at 2026-04-04T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13239
published_at 2026-04-07T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13321
published_at 2026-04-08T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13373
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13342
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13304
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423191
reference_id 2423191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423191
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43541
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8
41
url VCID-jbuw-yp7v-4fcz
vulnerability_id VCID-jbuw-yp7v-4fcz
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31223
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66868
published_at 2026-04-13T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66859
published_at 2026-04-04T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66831
published_at 2026-04-07T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66881
published_at 2026-04-08T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66894
published_at 2026-04-09T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66914
published_at 2026-04-11T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.669
published_at 2026-04-12T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67378
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448779
reference_id 2448779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448779
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31223
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz
42
url VCID-jyw2-fu8s-3fha
vulnerability_id VCID-jyw2-fu8s-3fha
summary Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14174
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75156
published_at 2026-04-02T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75187
published_at 2026-04-04T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75163
published_at 2026-04-07T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75198
published_at 2026-04-08T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.7521
published_at 2026-04-09T12:55:00Z
5
value 0.0091
scoring_system epss
scoring_elements 0.75838
published_at 2026-04-11T12:55:00Z
6
value 0.0091
scoring_system epss
scoring_elements 0.75819
published_at 2026-04-12T12:55:00Z
7
value 0.01047
scoring_system epss
scoring_elements 0.77501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2421824
reference_id 2421824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2421824
5
reference_url https://issues.chromium.org/issues/466192044
reference_id 466192044
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/
url https://issues.chromium.org/issues/466192044
6
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
7
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
8
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
9
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
10
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
11
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
12
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
13
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
14
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
15
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
16
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
17
reference_url https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/
url https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
18
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-14174
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha
43
url VCID-kdvu-rhgt-xqat
vulnerability_id VCID-kdvu-rhgt-xqat
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45855
published_at 2026-04-13T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45831
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45853
published_at 2026-04-04T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45803
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45859
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45856
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45878
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45848
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
reference_id 2366499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24223
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat
44
url VCID-ksq5-ygcp-nbaz
vulnerability_id VCID-ksq5-ygcp-nbaz
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31205
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37915
published_at 2026-04-13T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37994
published_at 2026-04-02T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38019
published_at 2026-04-04T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.37898
published_at 2026-04-07T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37949
published_at 2026-04-08T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37961
published_at 2026-04-09T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.37978
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.3794
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366501
reference_id 2366501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366501
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://access.redhat.com/errata/RHSA-2025:7995
reference_id RHSA-2025:7995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7995
17
reference_url https://access.redhat.com/errata/RHSA-2025:8046
reference_id RHSA-2025:8046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8046
18
reference_url https://access.redhat.com/errata/RHSA-2025:8530
reference_id RHSA-2025:8530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8530
19
reference_url https://access.redhat.com/errata/RHSA-2025:8532
reference_id RHSA-2025:8532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8532
20
reference_url https://access.redhat.com/errata/RHSA-2025:8533
reference_id RHSA-2025:8533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8533
21
reference_url https://access.redhat.com/errata/RHSA-2025:8534
reference_id RHSA-2025:8534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8534
22
reference_url https://access.redhat.com/errata/RHSA-2025:8541
reference_id RHSA-2025:8541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8541
23
reference_url https://access.redhat.com/errata/RHSA-2025:8600
reference_id RHSA-2025:8600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8600
24
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31205
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz
45
url VCID-kuyh-x3z4-q7gf
vulnerability_id VCID-kuyh-x3z4-q7gf
summary webkit: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
reference_id
reference_type
scores
0
value 0.00587
scoring_system epss
scoring_elements 0.69106
published_at 2026-04-13T12:55:00Z
1
value 0.00587
scoring_system epss
scoring_elements 0.69058
published_at 2026-04-02T12:55:00Z
2
value 0.00587
scoring_system epss
scoring_elements 0.69079
published_at 2026-04-04T12:55:00Z
3
value 0.00587
scoring_system epss
scoring_elements 0.6906
published_at 2026-04-07T12:55:00Z
4
value 0.00587
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-08T12:55:00Z
5
value 0.00587
scoring_system epss
scoring_elements 0.69129
published_at 2026-04-09T12:55:00Z
6
value 0.00587
scoring_system epss
scoring_elements 0.69152
published_at 2026-04-11T12:55:00Z
7
value 0.00587
scoring_system epss
scoring_elements 0.69136
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
reference_id 2333844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54505
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf
46
url VCID-kx6w-wbua-5ffr
vulnerability_id VCID-kx6w-wbua-5ffr
summary webkitgtk: A website may be able to access sensor information without user consent
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43356
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15335
published_at 2026-04-04T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15278
published_at 2026-04-09T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15227
published_at 2026-04-08T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15139
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16805
published_at 2026-04-02T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17611
published_at 2026-04-13T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17708
published_at 2026-04-11T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17662
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43356
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125109
reference_id 125109
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125109
6
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125113
7
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125114
8
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125115
9
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125116
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397628
reference_id 2397628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397628
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
21
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
22
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43356
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr
47
url VCID-ky87-8zpf-nqg2
vulnerability_id VCID-ky87-8zpf-nqg2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
reference_id
reference_type
scores
0
value 0.01119
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-02T12:55:00Z
1
value 0.01119
scoring_system epss
scoring_elements 0.7823
published_at 2026-04-13T12:55:00Z
2
value 0.01119
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-04T12:55:00Z
3
value 0.01119
scoring_system epss
scoring_elements 0.78194
published_at 2026-04-07T12:55:00Z
4
value 0.01119
scoring_system epss
scoring_elements 0.7822
published_at 2026-04-08T12:55:00Z
5
value 0.01119
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-09T12:55:00Z
6
value 0.01119
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-11T12:55:00Z
7
value 0.01119
scoring_system epss
scoring_elements 0.78234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
reference_id 2357919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-30427
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2
48
url VCID-m59e-8bgm-77he
vulnerability_id VCID-m59e-8bgm-77he
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43343
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35109
published_at 2026-04-04T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35061
published_at 2026-04-09T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35033
published_at 2026-04-08T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34988
published_at 2026-04-07T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-13T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.3798
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37942
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125110
reference_id 125110
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125110
6
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125113
7
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125114
8
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125115
9
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125116
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403598
reference_id 2403598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403598
11
reference_url https://access.redhat.com/errata/RHSA-2025:18070
reference_id RHSA-2025:18070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18070
12
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
13
reference_url https://access.redhat.com/errata/RHSA-2025:19913
reference_id RHSA-2025:19913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19913
14
reference_url https://access.redhat.com/errata/RHSA-2025:19914
reference_id RHSA-2025:19914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19914
15
reference_url https://access.redhat.com/errata/RHSA-2025:19915
reference_id RHSA-2025:19915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19915
16
reference_url https://access.redhat.com/errata/RHSA-2025:19916
reference_id RHSA-2025:19916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19916
17
reference_url https://access.redhat.com/errata/RHSA-2025:19918
reference_id RHSA-2025:19918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19918
18
reference_url https://access.redhat.com/errata/RHSA-2025:19919
reference_id RHSA-2025:19919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19919
19
reference_url https://access.redhat.com/errata/RHSA-2025:19920
reference_id RHSA-2025:19920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19920
20
reference_url https://access.redhat.com/errata/RHSA-2025:19946
reference_id RHSA-2025:19946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19946
21
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
22
reference_url https://usn.ubuntu.com/7895-1/
reference_id USN-7895-1
reference_type
scores
url https://usn.ubuntu.com/7895-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he
49
url VCID-mch4-qacj-f7ey
vulnerability_id VCID-mch4-qacj-f7ey
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40741
published_at 2026-04-11T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40715
published_at 2026-04-02T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40717
published_at 2026-04-08T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40667
published_at 2026-04-07T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-04T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40723
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43342
published_at 2026-04-13T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43358
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
reference_id 2353871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44192
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey
50
url VCID-mfg4-2ma4-3qgj
vulnerability_id VCID-mfg4-2ma4-3qgj
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43434
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416335
reference_id 2416335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416335
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43434
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj
51
url VCID-mhfm-j5xm-wybd
vulnerability_id VCID-mhfm-j5xm-wybd
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43431
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-13T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13133
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12936
published_at 2026-04-07T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-08T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13065
published_at 2026-04-09T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13027
published_at 2026-04-11T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.12988
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416332
reference_id 2416332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416332
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43431
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd
52
url VCID-n7w5-dz8n-mbht
vulnerability_id VCID-n7w5-dz8n-mbht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-02T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51302
published_at 2026-04-04T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51262
published_at 2026-04-07T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-08T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51314
published_at 2026-04-09T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51357
published_at 2026-04-11T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121569
9
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121571
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
reference_id 2323278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44244
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht
53
url VCID-nmvc-maj7-rfhm
vulnerability_id VCID-nmvc-maj7-rfhm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43536
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18813
published_at 2026-04-02T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.1863
published_at 2026-04-13T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18866
published_at 2026-04-04T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18588
published_at 2026-04-07T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18667
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18723
published_at 2026-04-09T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18728
published_at 2026-04-11T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18681
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125892
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423190
reference_id 2423190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423190
9
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
10
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
11
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
12
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
13
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
14
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
15
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
16
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
17
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
18
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
19
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
20
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43536
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm
54
url VCID-nu9v-3xak-77aw
vulnerability_id VCID-nu9v-3xak-77aw
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08273
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09114
published_at 2026-04-13T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-08T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.0905
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-11T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09128
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124149
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
reference_id 2384385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
9
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
10
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
11
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
12
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
13
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
14
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
15
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
16
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
17
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
18
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43240
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw
55
url VCID-p84d-5ze6-9fb5
vulnerability_id VCID-p84d-5ze6-9fb5
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.1092
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12046
published_at 2026-04-13T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.11971
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12053
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12105
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12112
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1217
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
reference_id 2386275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43228
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5
56
url VCID-ph63-r178-pfgg
vulnerability_id VCID-ph63-r178-pfgg
summary webkitgtk: webkitgtk: Use-after-free due to improper memory management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43529
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31831
published_at 2026-04-04T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31787
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31731
published_at 2026-04-09T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31702
published_at 2026-04-08T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.3165
published_at 2026-04-07T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35872
published_at 2026-04-13T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35936
published_at 2026-04-11T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35896
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125889
8
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125890
9
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125891
10
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125892
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423166
reference_id 2423166
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423166
12
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
13
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
14
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
15
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
16
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
17
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
18
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
19
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
20
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
21
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
22
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
23
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43529
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg
57
url VCID-pwqw-z8jj-abfs
vulnerability_id VCID-pwqw-z8jj-abfs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43440
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12099
published_at 2026-04-13T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12027
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12161
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12168
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12131
published_at 2026-04-12T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416336
reference_id 2416336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416336
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43440
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs
58
url VCID-pyek-9fpp-nudy
vulnerability_id VCID-pyek-9fpp-nudy
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-13T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25472
published_at 2026-04-07T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25546
published_at 2026-04-08T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25594
published_at 2026-04-09T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-11T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25563
published_at 2026-04-12T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25663
published_at 2026-04-02T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25704
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121241
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
reference_id 2312724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
9
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
10
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-40866
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy
59
url VCID-qytm-81jk-muhc
vulnerability_id VCID-qytm-81jk-muhc
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43432
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10285
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10283
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10179
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10253
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10315
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10345
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10304
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43432
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416334
reference_id 2416334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416334
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43432
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc
60
url VCID-r857-ke39-xug8
vulnerability_id VCID-r857-ke39-xug8
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32854
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-13T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34755
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34632
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34676
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34704
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
reference_id 2386274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43227
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8
61
url VCID-rj9q-8rw3-qbbn
vulnerability_id VCID-rj9q-8rw3-qbbn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
reference_id
reference_type
scores
0
value 0.01384
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-02T12:55:00Z
1
value 0.01384
scoring_system epss
scoring_elements 0.8031
published_at 2026-04-13T12:55:00Z
2
value 0.01384
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-04T12:55:00Z
3
value 0.01384
scoring_system epss
scoring_elements 0.80274
published_at 2026-04-07T12:55:00Z
4
value 0.01384
scoring_system epss
scoring_elements 0.80302
published_at 2026-04-08T12:55:00Z
5
value 0.01384
scoring_system epss
scoring_elements 0.80313
published_at 2026-04-09T12:55:00Z
6
value 0.01384
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-11T12:55:00Z
7
value 0.01384
scoring_system epss
scoring_elements 0.80316
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
reference_id 2357918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
15
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
16
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
17
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24264
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn
62
url VCID-stjs-xknd-zfgh
vulnerability_id VCID-stjs-xknd-zfgh
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66287
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21677
published_at 2026-04-04T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21619
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27617
published_at 2026-04-13T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27604
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27671
published_at 2026-04-08T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27714
published_at 2026-04-09T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27719
published_at 2026-04-11T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66287
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418857
reference_id 2418857
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2418857
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-66287
reference_id CVE-2025-66287
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/security/cve/CVE-2025-66287
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23743
34
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
35
reference_url https://webkitgtk.org/security/WSA-2025-0009.html
reference_id WSA-2025-0009.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://webkitgtk.org/security/WSA-2025-0009.html
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-66287
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh
63
url VCID-tqb3-nabh-tkeh
vulnerability_id VCID-tqb3-nabh-tkeh
summary webkitgtk: data isolation bypass vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44309
reference_id
reference_type
scores
0
value 0.01158
scoring_system epss
scoring_elements 0.78526
published_at 2026-04-02T12:55:00Z
1
value 0.01274
scoring_system epss
scoring_elements 0.79532
published_at 2026-04-13T12:55:00Z
2
value 0.01274
scoring_system epss
scoring_elements 0.79513
published_at 2026-04-04T12:55:00Z
3
value 0.01274
scoring_system epss
scoring_elements 0.79499
published_at 2026-04-07T12:55:00Z
4
value 0.01274
scoring_system epss
scoring_elements 0.79527
published_at 2026-04-08T12:55:00Z
5
value 0.01274
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-09T12:55:00Z
6
value 0.01274
scoring_system epss
scoring_elements 0.79557
published_at 2026-04-11T12:55:00Z
7
value 0.01274
scoring_system epss
scoring_elements 0.7954
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121752
reference_id 121752
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121752
5
reference_url https://support.apple.com/en-us/121753
reference_id 121753
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121753
6
reference_url https://support.apple.com/en-us/121754
reference_id 121754
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121754
7
reference_url https://support.apple.com/en-us/121755
reference_id 121755
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121755
8
reference_url https://support.apple.com/en-us/121756
reference_id 121756
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121756
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327927
reference_id 2327927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327927
10
reference_url https://access.redhat.com/errata/RHSA-2024:10472
reference_id RHSA-2024:10472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10472
11
reference_url https://access.redhat.com/errata/RHSA-2024:10480
reference_id RHSA-2024:10480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10480
12
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
13
reference_url https://access.redhat.com/errata/RHSA-2024:10482
reference_id RHSA-2024:10482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10482
14
reference_url https://access.redhat.com/errata/RHSA-2024:10483
reference_id RHSA-2024:10483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10483
15
reference_url https://access.redhat.com/errata/RHSA-2024:10489
reference_id RHSA-2024:10489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10489
16
reference_url https://access.redhat.com/errata/RHSA-2024:10492
reference_id RHSA-2024:10492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10492
17
reference_url https://access.redhat.com/errata/RHSA-2024:10496
reference_id RHSA-2024:10496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10496
18
reference_url https://access.redhat.com/errata/RHSA-2024:10501
reference_id RHSA-2024:10501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10501
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/7142-1/
reference_id USN-7142-1
reference_type
scores
url https://usn.ubuntu.com/7142-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44309
risk_score 10.0
exploitability 2.0
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqb3-nabh-tkeh
64
url VCID-u6k6-1hmc-tfaf
vulnerability_id VCID-u6k6-1hmc-tfaf
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43427
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19484
published_at 2026-04-13T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19732
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19456
published_at 2026-04-07T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19535
published_at 2026-04-08T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19587
published_at 2026-04-09T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1959
published_at 2026-04-11T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19542
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20366
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125640
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416329
reference_id 2416329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416329
10
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
11
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
12
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
13
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
14
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
15
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
16
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
17
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
18
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
19
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
20
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
21
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43427
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf
65
url VCID-u9g4-5f16-yqc9
vulnerability_id VCID-u9g4-5f16-yqc9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
reference_id
reference_type
scores
0
value 0.02557
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-13T12:55:00Z
1
value 0.02557
scoring_system epss
scoring_elements 0.85465
published_at 2026-04-04T12:55:00Z
2
value 0.02557
scoring_system epss
scoring_elements 0.85468
published_at 2026-04-07T12:55:00Z
3
value 0.02557
scoring_system epss
scoring_elements 0.85489
published_at 2026-04-08T12:55:00Z
4
value 0.02557
scoring_system epss
scoring_elements 0.85497
published_at 2026-04-09T12:55:00Z
5
value 0.02557
scoring_system epss
scoring_elements 0.85512
published_at 2026-04-11T12:55:00Z
6
value 0.02557
scoring_system epss
scoring_elements 0.8551
published_at 2026-04-12T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87339
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122376
8
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122377
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
reference_id 2357911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24209
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9
66
url VCID-unu1-sbnm-27bf
vulnerability_id VCID-unu1-sbnm-27bf
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43433
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-13T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13133
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12936
published_at 2026-04-07T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-08T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13065
published_at 2026-04-09T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13027
published_at 2026-04-11T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.12988
published_at 2026-04-12T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14014
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448783
reference_id 2448783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448783
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43433
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf
67
url VCID-vk4e-qufz-5ffp
vulnerability_id VCID-vk4e-qufz-5ffp
summary angle: insufficient input validation can cause undefined behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6558
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37959
published_at 2026-04-13T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37993
published_at 2026-04-08T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38004
published_at 2026-04-09T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.38021
published_at 2026-04-11T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37984
published_at 2026-04-12T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44447
published_at 2026-04-04T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44381
published_at 2026-04-07T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44426
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2380254
reference_id 2380254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2380254
5
reference_url https://issues.chromium.org/issues/427162086
reference_id 427162086
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/
url https://issues.chromium.org/issues/427162086
6
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
7
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
8
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
9
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
10
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
11
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
12
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
13
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
14
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
15
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
16
reference_url https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/
url https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
17
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-6558
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp
68
url VCID-w3r3-11kt-2ydu
vulnerability_id VCID-w3r3-11kt-2ydu
summary webkitgtk: A website may exfiltrate image data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43392
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08627
published_at 2026-04-13T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08649
published_at 2026-04-04T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08567
published_at 2026-04-07T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.0864
published_at 2026-04-08T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08664
published_at 2026-04-09T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08662
published_at 2026-04-11T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08639
published_at 2026-04-12T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08987
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416325
reference_id 2416325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416325
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43392
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu
69
url VCID-wbn4-ea3w-k7f3
vulnerability_id VCID-wbn4-ea3w-k7f3
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
reference_id
reference_type
scores
0
value 0.0086
scoring_system epss
scoring_elements 0.74985
published_at 2026-04-02T12:55:00Z
1
value 0.0086
scoring_system epss
scoring_elements 0.75025
published_at 2026-04-13T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.75014
published_at 2026-04-04T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.7499
published_at 2026-04-07T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.75024
published_at 2026-04-08T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75036
published_at 2026-04-12T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.75057
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
reference_id 2344623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
11
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
14
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24158
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3
70
url VCID-whma-xbxr-5uay
vulnerability_id VCID-whma-xbxr-5uay
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43342
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52355
published_at 2026-04-04T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.52326
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52366
published_at 2026-04-09T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.5237
published_at 2026-04-08T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52317
published_at 2026-04-07T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.56087
published_at 2026-04-13T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56127
published_at 2026-04-11T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.56104
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125109
reference_id 125109
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125109
6
reference_url https://support.apple.com/en-us/125110
reference_id 125110
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125110
7
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125113
8
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125114
9
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125115
10
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125116
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397627
reference_id 2397627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397627
12
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
13
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
14
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
15
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
16
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
17
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
18
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
19
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
20
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
21
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
22
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
23
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay
71
url VCID-wnxh-854z-ykfk
vulnerability_id VCID-wnxh-854z-ykfk
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05046
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04925
published_at 2026-04-13T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.0491
published_at 2026-04-04T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04929
published_at 2026-04-07T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.04965
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04981
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04963
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
reference_id 2386270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43211
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk
72
url VCID-xpp8-357g-c7gp
vulnerability_id VCID-xpp8-357g-c7gp
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43441
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448785
reference_id 2448785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448785
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43441
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp
73
url VCID-xr5y-1ebg-xqcj
vulnerability_id VCID-xr5y-1ebg-xqcj
summary webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13502
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29379
published_at 2026-04-13T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29472
published_at 2026-04-09T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29475
published_at 2026-04-11T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29498
published_at 2026-04-02T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29546
published_at 2026-04-04T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29367
published_at 2026-04-07T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29431
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416300
reference_id 2416300
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2416300
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-13502
reference_id CVE-2025-13502
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/security/cve/CVE-2025-13502
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-13502
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj
74
url VCID-yg6b-hsst-ckaa
vulnerability_id VCID-yg6b-hsst-ckaa
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.2663
published_at 2026-04-02T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28519
published_at 2026-04-13T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28699
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28505
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28569
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.2861
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28612
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
reference_id 2386269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31278
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa
75
url VCID-z7hw-fywx-dffc
vulnerability_id VCID-z7hw-fywx-dffc
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43535
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11546
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11478
published_at 2026-04-13T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11601
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.1139
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11473
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11532
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11542
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11508
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43535
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423188
reference_id 2423188
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423188
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43535
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1