{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","type":"deb","namespace":"debian","name":"webkit2gtk","version":"2.50.4-1~deb12u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.50.6-1~deb12u1","latest_non_vulnerable_version":"2.52.1-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64216?format=json","vulnerability_id":"VCID-25ng-4kwb-qfat","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20636","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12549","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12606","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448791","reference_id":"2448791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448791"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2026-20636"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64217?format=json","vulnerability_id":"VCID-4k57-k2s6-wkhx","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20644","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13607","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448792","reference_id":"2448792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448792"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2026-20644"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64206?format=json","vulnerability_id":"VCID-7ut5-fu6w-63fs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43213","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31172","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31216","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448781","reference_id":"2448781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448781"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2025-43213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63947?format=json","vulnerability_id":"VCID-88kv-qter-5fc3","summary":"webkitgtk: A malicious website may be able to access script message handlers intended for other origins","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28861","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10489","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10511","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453007","reference_id":"2453007","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453007"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-28861"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88kv-qter-5fc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63942?format=json","vulnerability_id":"VCID-8cxd-4p9j-dyf1","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20664","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11433","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11462","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453001","reference_id":"2453001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453001"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-20664"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cxd-4p9j-dyf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64212?format=json","vulnerability_id":"VCID-988h-sqnj-57fg","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43511","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24919","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448787","reference_id":"2448787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448787"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2025-43511"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63948?format=json","vulnerability_id":"VCID-eu4s-vvyf-pqh3","summary":"webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28871","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10108","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10209","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453008","reference_id":"2453008","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453008"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-28871"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu4s-vvyf-pqh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63946?format=json","vulnerability_id":"VCID-ffha-wafn-sqa9","summary":"webkitgtk: A malicious website may be able to process restricted web content outside the sandbox","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28859","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.12006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11996","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11959","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126797","reference_id":"126797","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126797"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453006","reference_id":"2453006","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453006"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-28859"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffha-wafn-sqa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63944?format=json","vulnerability_id":"VCID-fpvs-seby-kfhv","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20691","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10489","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10511","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453003","reference_id":"2453003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453003"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-20691"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpvs-seby-kfhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63943?format=json","vulnerability_id":"VCID-gqm2-5nh3-7ufp","summary":"webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20665","reference_id":"","reference_type":"","scores":[{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36537","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36502","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126797","reference_id":"126797","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126797"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453002","reference_id":"2453002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453002"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-20665"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm2-5nh3-7ufp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64215?format=json","vulnerability_id":"VCID-mmcp-4qnx-5ufh","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20635","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15297","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15357","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126351","reference_id":"126351","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126351"},{"reference_url":"https://support.apple.com/en-us/126352","reference_id":"126352","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126352"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448790","reference_id":"2448790","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448790"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2026-20635"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63941?format=json","vulnerability_id":"VCID-nwkr-s7vs-p7fz","summary":"webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20643","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0982","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09788","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126604","reference_id":"126604","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126604"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453000","reference_id":"2453000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453000"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-20643"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nwkr-s7vs-p7fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64219?format=json","vulnerability_id":"VCID-t46t-rhgu-cbc1","summary":"webkitgtk: A website may be able to track users through Safari web extensions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20676","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10718","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20676"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448794","reference_id":"2448794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448794"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2026-20676"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64213?format=json","vulnerability_id":"VCID-teue-y6qz-jyfw","summary":"webkitgtk: Processing maliciously crafted web content may disclose internal states of the app","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46299","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06086","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06094","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448788","reference_id":"2448788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448788"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2025-46299"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teue-y6qz-jyfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64218?format=json","vulnerability_id":"VCID-w5gq-k53s-tuc5","summary":"webkitgtk: A remote attacker may be able to cause a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20652","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37972","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448793","reference_id":"2448793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448793"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2026-20652"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64211?format=json","vulnerability_id":"VCID-wrt4-z8ne-zffm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43457","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09336","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448786","reference_id":"2448786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448786"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2025-43457"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64207?format=json","vulnerability_id":"VCID-x5sh-5xtn-r7cp","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43214","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36986","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448782","reference_id":"2448782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448782"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2025-43214"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64214?format=json","vulnerability_id":"VCID-yfww-r9rn-73dy","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20608","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02495","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448789","reference_id":"2448789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448789"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"}],"aliases":["CVE-2026-20608"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63945?format=json","vulnerability_id":"VCID-zk2j-9hd2-hfcn","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28857","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11463","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453004","reference_id":"2453004","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453004"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995087?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/995089?format=json","purl":"pkg:deb/debian/webkit2gtk@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1"}],"aliases":["CVE-2026-28857"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zk2j-9hd2-hfcn"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61856?format=json","vulnerability_id":"VCID-1vsk-e1mf-6uaz","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29953","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29906","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273","reference_id":"2386273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61837?format=json","vulnerability_id":"VCID-1xcs-fpk3-nyg4","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44187","reference_id":"","reference_type":"","scores":[{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67584","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67616","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44187"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706","reference_id":"2314706","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7079-1/","reference_id":"USN-7079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7079-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-44187"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68448?format=json","vulnerability_id":"VCID-23pb-y6g6-sbed","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24189","reference_id":"","reference_type":"","scores":[{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75809","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00912","scoring_system":"epss","scoring_elements":"0.75859","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386267","reference_id":"2386267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24189"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-23pb-y6g6-sbed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66399?format=json","vulnerability_id":"VCID-2hr6-uu49-1qb7","summary":"webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22388","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576","reference_id":"2418576","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13947","reference_id":"CVE-2025-13947","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-13947"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61840?format=json","vulnerability_id":"VCID-2nmg-6jk2-ebcb","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44296","reference_id":"","reference_type":"","scores":[{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.71214","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00664","scoring_system":"epss","scoring_elements":"0.712","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121563","reference_id":"121563","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121563"},{"reference_url":"https://support.apple.com/en-us/121564","reference_id":"121564","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121564"},{"reference_url":"https://support.apple.com/en-us/121565","reference_id":"121565","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121565"},{"reference_url":"https://support.apple.com/en-us/121566","reference_id":"121566","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121566"},{"reference_url":"https://support.apple.com/en-us/121567","reference_id":"121567","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121567"},{"reference_url":"https://support.apple.com/en-us/121569","reference_id":"121569","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121569"},{"reference_url":"https://support.apple.com/en-us/121571","reference_id":"121571","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/"}],"url":"https://support.apple.com/en-us/121571"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323289","reference_id":"2323289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323289"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9545","reference_id":"RHSA-2024:9545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7113-1/","reference_id":"USN-7113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7113-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-44296"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66451?format=json","vulnerability_id":"VCID-2pgr-9muu-s3ge","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16305","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337","reference_id":"2416337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43443"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61844?format=json","vulnerability_id":"VCID-2rm2-f5xj-1bb2","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24208","reference_id":"","reference_type":"","scores":[{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54608","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357910","reference_id":"2357910","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357910"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24208"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72615?format=json","vulnerability_id":"VCID-2vtf-gudd-9fah","summary":"WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54479","reference_id":"","reference_type":"","scores":[{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-08T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72001","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121838","reference_id":"121838","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121838"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333841","reference_id":"2333841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-54479"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61836?format=json","vulnerability_id":"VCID-3daw-8nh6-dfcq","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11511","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263","reference_id":"2323263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-44185"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71950?format=json","vulnerability_id":"VCID-3frv-ppjt-9bdy","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24143","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32581","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344621","reference_id":"2344621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24143"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3frv-ppjt-9bdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61852?format=json","vulnerability_id":"VCID-3k6e-zz11-93bn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28387","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268","reference_id":"2386268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31273"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61855?format=json","vulnerability_id":"VCID-5q44-vqhn-zydx","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26334","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26221","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271","reference_id":"2386271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43212"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71951?format=json","vulnerability_id":"VCID-5x1k-uam9-5bhs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24162","reference_id":"","reference_type":"","scores":[{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.7871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78749","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344624","reference_id":"2344624","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1957","reference_id":"RHSA-2025:1957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1958","reference_id":"RHSA-2025:1958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1959","reference_id":"RHSA-2025:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1960","reference_id":"RHSA-2025:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2035","reference_id":"RHSA-2025:2035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2121","reference_id":"RHSA-2025:2121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2126","reference_id":"RHSA-2025:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2126"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24162"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5x1k-uam9-5bhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65877?format=json","vulnerability_id":"VCID-76jg-y2sa-f7cu","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43501","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22763","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423185","reference_id":"2423185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43501"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61841?format=json","vulnerability_id":"VCID-7gyr-mvmk-pfh9","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54467","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40547","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43221","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353872","reference_id":"2353872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353872"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-54467"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66445?format=json","vulnerability_id":"VCID-7j7p-hnbd-hudk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13587","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14338","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330","reference_id":"2416330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43429"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72614?format=json","vulnerability_id":"VCID-9j6k-np3x-23f7","summary":"webkit: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54508","reference_id":"","reference_type":"","scores":[{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80304","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80656","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333845","reference_id":"2333845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-54508"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66446?format=json","vulnerability_id":"VCID-ahcu-937r-57fu","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27201","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331","reference_id":"2416331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43430"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67451?format=json","vulnerability_id":"VCID-aqvh-emss-bufx","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43368","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17045","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397630","reference_id":"2397630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43368"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66442?format=json","vulnerability_id":"VCID-az2z-2mnu-sfbh","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43419","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10581","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11092","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416326","reference_id":"2416326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43419"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61843?format=json","vulnerability_id":"VCID-azef-hxum-z3eb","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24201","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27125","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122281","reference_id":"122281","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122281"},{"reference_url":"https://support.apple.com/en-us/122283","reference_id":"122283","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122283"},{"reference_url":"https://support.apple.com/en-us/122284","reference_id":"122284","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122284"},{"reference_url":"https://support.apple.com/en-us/122285","reference_id":"122285","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122285"},{"reference_url":"https://support.apple.com/en-us/122345","reference_id":"122345","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122345"},{"reference_url":"https://support.apple.com/en-us/122346","reference_id":"122346","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122346"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122376","reference_id":"122376","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/"}],"url":"https://support.apple.com/en-us/122376"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351802","reference_id":"2351802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351802"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2863","reference_id":"RHSA-2025:2863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2864","reference_id":"RHSA-2025:2864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2997","reference_id":"RHSA-2025:2997","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2997"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2998","reference_id":"RHSA-2025:2998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3000","reference_id":"RHSA-2025:3000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3001","reference_id":"RHSA-2025:3001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3002","reference_id":"RHSA-2025:3002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3005","reference_id":"RHSA-2025:3005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3034","reference_id":"RHSA-2025:3034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3034"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24201"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72611?format=json","vulnerability_id":"VCID-b3dw-sj5b-5bhr","summary":"webkit: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54502","reference_id":"","reference_type":"","scores":[{"value":"0.05739","scoring_system":"epss","scoring_elements":"0.9041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.9167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07285","scoring_system":"epss","scoring_elements":"0.91667","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333843","reference_id":"2333843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-54502"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71949?format=json","vulnerability_id":"VCID-b8ws-1k92-7bhq","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54543","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3473","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344619","reference_id":"2344619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1957","reference_id":"RHSA-2025:1957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1958","reference_id":"RHSA-2025:1958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1959","reference_id":"RHSA-2025:1959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1960","reference_id":"RHSA-2025:1960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2035","reference_id":"RHSA-2025:2035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2121","reference_id":"RHSA-2025:2121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2126","reference_id":"RHSA-2025:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2126"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-54543"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64209?format=json","vulnerability_id":"VCID-bjtx-twmy-jbgk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784","reference_id":"2448784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43438"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61847?format=json","vulnerability_id":"VCID-bkcz-d48v-7uca","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24213","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31916","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357913","reference_id":"2357913","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357913"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69654?format=json","vulnerability_id":"VCID-c4np-b4zq-tkch","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71245","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500","reference_id":"2366500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69657?format=json","vulnerability_id":"VCID-c9mb-24v2-q3ba","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215","reference_id":"","reference_type":"","scores":[{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78256","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503","reference_id":"2366503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31215"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61842?format=json","vulnerability_id":"VCID-cmdy-ztbw-jffq","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54551","reference_id":"","reference_type":"","scores":[{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.6615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.6618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66186","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357909","reference_id":"2357909","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357909"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-54551"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61849?format=json","vulnerability_id":"VCID-cw56-pdyr-fbge","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24216","reference_id":"","reference_type":"","scores":[{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.7439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74397","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74413","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357917","reference_id":"2357917","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357917"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72793?format=json","vulnerability_id":"VCID-dd4q-8fs5-3kej","summary":"webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44308","reference_id":"","reference_type":"","scores":[{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81399","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81364","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01547","scoring_system":"epss","scoring_elements":"0.81406","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121752","reference_id":"121752","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121752"},{"reference_url":"https://support.apple.com/en-us/121753","reference_id":"121753","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121753"},{"reference_url":"https://support.apple.com/en-us/121754","reference_id":"121754","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121754"},{"reference_url":"https://support.apple.com/en-us/121755","reference_id":"121755","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121755"},{"reference_url":"https://support.apple.com/en-us/121756","reference_id":"121756","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/"}],"url":"https://support.apple.com/en-us/121756"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327931","reference_id":"2327931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7142-1/","reference_id":"USN-7142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-44308"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dd4q-8fs5-3kej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65878?format=json","vulnerability_id":"VCID-dvx9-km9t-yqfv","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43531","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30733","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423187","reference_id":"2423187","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43531"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67448?format=json","vulnerability_id":"VCID-ednn-ppw1-myfk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43272","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19614","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19534","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22045","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397626","reference_id":"2397626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43272"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66367?format=json","vulnerability_id":"VCID-ems1-41u6-vbex","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21892","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22678","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855","reference_id":"2418855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43458"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66453?format=json","vulnerability_id":"VCID-epzj-t14z-43d2","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08344","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08623","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355","reference_id":"2416355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43421"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69656?format=json","vulnerability_id":"VCID-ey9n-zksh-mbfm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206","reference_id":"","reference_type":"","scores":[{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78155","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502","reference_id":"2366502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69658?format=json","vulnerability_id":"VCID-fzqz-yfn1-7yfd","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257","reference_id":"","reference_type":"","scores":[{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74034","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74037","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504","reference_id":"2366504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31257"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66443?format=json","vulnerability_id":"VCID-gqjq-p4re-gkf6","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327","reference_id":"2416327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43425"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64205?format=json","vulnerability_id":"VCID-gwt6-n8ue-mqcf","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31277","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39147","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39163","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.4111","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448780","reference_id":"2448780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31277"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71948?format=json","vulnerability_id":"VCID-hp6k-spzk-vbaa","summary":"webkitgtk: Copying a URL from Web Inspector may lead to command injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24150","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53944","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54028","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344622","reference_id":"2344622","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2125","reference_id":"RHSA-2025:2125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2125"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24150"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hp6k-spzk-vbaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61860?format=json","vulnerability_id":"VCID-hvj6-wsg9-1bhg","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05436","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276","reference_id":"2386276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43265"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65881?format=json","vulnerability_id":"VCID-j31g-7h17-27c8","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43541","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13304","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423191","reference_id":"2423191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43541"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64204?format=json","vulnerability_id":"VCID-jbuw-yp7v-4fcz","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31223","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67378","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448779","reference_id":"2448779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66054?format=json","vulnerability_id":"VCID-jyw2-fu8s-3fha","summary":"Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14174","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.7521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75819","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77501","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421824","reference_id":"2421824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421824"},{"reference_url":"https://issues.chromium.org/issues/466192044","reference_id":"466192044","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/"}],"url":"https://issues.chromium.org/issues/466192044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html","reference_id":"stable-channel-update-for-desktop_10.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/"}],"url":"https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-14174"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69653?format=json","vulnerability_id":"VCID-kdvu-rhgt-xqat","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45878","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45848","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499","reference_id":"2366499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69655?format=json","vulnerability_id":"VCID-ksq5-ygcp-nbaz","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37915","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3794","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501","reference_id":"2366501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31205"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72613?format=json","vulnerability_id":"VCID-kuyh-x3z4-q7gf","summary":"webkit: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54505","reference_id":"","reference_type":"","scores":[{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69136","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121838","reference_id":"121838","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121838"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333844","reference_id":"2333844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0145","reference_id":"RHSA-2025:0145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0146","reference_id":"RHSA-2025:0146","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0146"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0226","reference_id":"RHSA-2025:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0276","reference_id":"RHSA-2025:0276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0277","reference_id":"RHSA-2025:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0278","reference_id":"RHSA-2025:0278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0279","reference_id":"RHSA-2025:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0282","reference_id":"RHSA-2025:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0283","reference_id":"RHSA-2025:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7201-1/","reference_id":"USN-7201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7201-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-54505"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67450?format=json","vulnerability_id":"VCID-kx6w-wbua-5ffr","summary":"webkitgtk: A website may be able to access sensor information without user consent","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43356","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17611","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17662","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125109","reference_id":"125109","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125109"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397628","reference_id":"2397628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43356"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61851?format=json","vulnerability_id":"VCID-ky87-8zpf-nqg2","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30427","reference_id":"","reference_type":"","scores":[{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.7822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78252","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01119","scoring_system":"epss","scoring_elements":"0.78234","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357919","reference_id":"2357919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357919"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-30427"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66910?format=json","vulnerability_id":"VCID-m59e-8bgm-77he","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43343","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35061","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37942","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125110","reference_id":"125110","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125110"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403598","reference_id":"2403598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18070","reference_id":"RHSA-2025:18070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19913","reference_id":"RHSA-2025:19913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19914","reference_id":"RHSA-2025:19914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19915","reference_id":"RHSA-2025:19915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19916","reference_id":"RHSA-2025:19916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19918","reference_id":"RHSA-2025:19918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19919","reference_id":"RHSA-2025:19919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19920","reference_id":"RHSA-2025:19920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19946","reference_id":"RHSA-2025:19946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7895-1/","reference_id":"USN-7895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43343"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61838?format=json","vulnerability_id":"VCID-mch4-qacj-f7ey","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44192","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43358","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44192"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121240","reference_id":"121240","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121240"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://support.apple.com/en-us/121248","reference_id":"121248","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121248"},{"reference_url":"https://support.apple.com/en-us/121249","reference_id":"121249","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121249"},{"reference_url":"https://support.apple.com/en-us/121250","reference_id":"121250","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/"}],"url":"https://support.apple.com/en-us/121250"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353871","reference_id":"2353871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2353871"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7395-1/","reference_id":"USN-7395-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7395-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-44192"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66449?format=json","vulnerability_id":"VCID-mfg4-2ma4-3qgj","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335","reference_id":"2416335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43434"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66447?format=json","vulnerability_id":"VCID-mhfm-j5xm-wybd","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332","reference_id":"2416332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43431"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61839?format=json","vulnerability_id":"VCID-n7w5-dz8n-mbht","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51336","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121563","reference_id":"121563","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121563"},{"reference_url":"https://support.apple.com/en-us/121564","reference_id":"121564","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121564"},{"reference_url":"https://support.apple.com/en-us/121565","reference_id":"121565","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121565"},{"reference_url":"https://support.apple.com/en-us/121566","reference_id":"121566","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121566"},{"reference_url":"https://support.apple.com/en-us/121569","reference_id":"121569","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121569"},{"reference_url":"https://support.apple.com/en-us/121571","reference_id":"121571","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121571"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278","reference_id":"2323278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9545","reference_id":"RHSA-2024:9545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7113-1/","reference_id":"USN-7113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7113-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-44244"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65880?format=json","vulnerability_id":"VCID-nmvc-maj7-rfhm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43536","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18681","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423190","reference_id":"2423190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43536"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61859?format=json","vulnerability_id":"VCID-nu9v-3xak-77aw","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09128","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385","reference_id":"2384385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43240"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61858?format=json","vulnerability_id":"VCID-p84d-5ze6-9fb5","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43228","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12046","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12075","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1217","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386275","reference_id":"2386275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386275"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43228"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66045?format=json","vulnerability_id":"VCID-ph63-r178-pfgg","summary":"webkitgtk: webkitgtk: Use-after-free due to improper memory management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43529","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35936","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35896","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423166","reference_id":"2423166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43529"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66450?format=json","vulnerability_id":"VCID-pwqw-z8jj-abfs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12161","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13044","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336","reference_id":"2416336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43440"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61835?format=json","vulnerability_id":"VCID-pyek-9fpp-nudy","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40866","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25704","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121238","reference_id":"121238","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/"}],"url":"https://support.apple.com/en-us/121238"},{"reference_url":"https://support.apple.com/en-us/121241","reference_id":"121241","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/"}],"url":"https://support.apple.com/en-us/121241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724","reference_id":"2312724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7079-1/","reference_id":"USN-7079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7079-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-40866"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66448?format=json","vulnerability_id":"VCID-qytm-81jk-muhc","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334","reference_id":"2416334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43432"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61857?format=json","vulnerability_id":"VCID-r857-ke39-xug8","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34668","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274","reference_id":"2386274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43227"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61850?format=json","vulnerability_id":"VCID-rj9q-8rw3-qbbn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264","reference_id":"","reference_type":"","scores":[{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.8031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80316","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918","reference_id":"2357918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24264"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66368?format=json","vulnerability_id":"VCID-stjs-xknd-zfgh","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27675","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857","reference_id":"2418857","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-66287","reference_id":"CVE-2025-66287","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-66287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"},{"reference_url":"https://webkitgtk.org/security/WSA-2025-0009.html","reference_id":"WSA-2025-0009.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://webkitgtk.org/security/WSA-2025-0009.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-66287"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72701?format=json","vulnerability_id":"VCID-tqb3-nabh-tkeh","summary":"webkitgtk: data isolation bypass vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44309","reference_id":"","reference_type":"","scores":[{"value":"0.01158","scoring_system":"epss","scoring_elements":"0.78526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.79557","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01274","scoring_system":"epss","scoring_elements":"0.7954","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121752","reference_id":"121752","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121752"},{"reference_url":"https://support.apple.com/en-us/121753","reference_id":"121753","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121753"},{"reference_url":"https://support.apple.com/en-us/121754","reference_id":"121754","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121754"},{"reference_url":"https://support.apple.com/en-us/121755","reference_id":"121755","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121755"},{"reference_url":"https://support.apple.com/en-us/121756","reference_id":"121756","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/"}],"url":"https://support.apple.com/en-us/121756"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327927","reference_id":"2327927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10472","reference_id":"RHSA-2024:10472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10480","reference_id":"RHSA-2024:10480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10481","reference_id":"RHSA-2024:10481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10482","reference_id":"RHSA-2024:10482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10483","reference_id":"RHSA-2024:10483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10489","reference_id":"RHSA-2024:10489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10492","reference_id":"RHSA-2024:10492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10496","reference_id":"RHSA-2024:10496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10501","reference_id":"RHSA-2024:10501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7142-1/","reference_id":"USN-7142-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7142-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2024-44309"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqb3-nabh-tkeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66444?format=json","vulnerability_id":"VCID-u6k6-1hmc-tfaf","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20366","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329","reference_id":"2416329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43427"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61845?format=json","vulnerability_id":"VCID-u9g4-5f16-yqc9","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24209","reference_id":"","reference_type":"","scores":[{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85468","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85497","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02557","scoring_system":"epss","scoring_elements":"0.8551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87339","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122376","reference_id":"122376","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122376"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357911","reference_id":"2357911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357911"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3713","reference_id":"RHSA-2025:3713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3755","reference_id":"RHSA-2025:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3756","reference_id":"RHSA-2025:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3974","reference_id":"RHSA-2025:3974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4445","reference_id":"RHSA-2025:4445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7387","reference_id":"RHSA-2025:7387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7998","reference_id":"RHSA-2025:7998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8064","reference_id":"RHSA-2025:8064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8065","reference_id":"RHSA-2025:8065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8066","reference_id":"RHSA-2025:8066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8194","reference_id":"RHSA-2025:8194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8194"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24209"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64208?format=json","vulnerability_id":"VCID-unu1-sbnm-27bf","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14014","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783","reference_id":"2448783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43433"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68659?format=json","vulnerability_id":"VCID-vk4e-qufz-5ffp","summary":"angle: insufficient input validation can cause undefined behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37984","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44426","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254","reference_id":"2380254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254"},{"reference_url":"https://issues.chromium.org/issues/427162086","reference_id":"427162086","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://issues.chromium.org/issues/427162086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html","reference_id":"stable-channel-update-for-desktop_15.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-6558"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66441?format=json","vulnerability_id":"VCID-w3r3-11kt-2ydu","summary":"webkitgtk: A website may exfiltrate image data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08987","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325","reference_id":"2416325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43392"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71952?format=json","vulnerability_id":"VCID-wbn4-ea3w-k7f3","summary":"webkitgtk: Processing web content may lead to a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24158","reference_id":"","reference_type":"","scores":[{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.74985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75057","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122066","reference_id":"122066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122066"},{"reference_url":"https://support.apple.com/en-us/122068","reference_id":"122068","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122068"},{"reference_url":"https://support.apple.com/en-us/122071","reference_id":"122071","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122071"},{"reference_url":"https://support.apple.com/en-us/122072","reference_id":"122072","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122072"},{"reference_url":"https://support.apple.com/en-us/122073","reference_id":"122073","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122073"},{"reference_url":"https://support.apple.com/en-us/122074","reference_id":"122074","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/"}],"url":"https://support.apple.com/en-us/122074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344623","reference_id":"2344623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2034","reference_id":"RHSA-2025:2034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2034"},{"reference_url":"https://usn.ubuntu.com/7279-1/","reference_id":"USN-7279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-24158"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67449?format=json","vulnerability_id":"VCID-whma-xbxr-5uay","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43342","reference_id":"","reference_type":"","scores":[{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52355","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56104","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125109","reference_id":"125109","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125109"},{"reference_url":"https://support.apple.com/en-us/125110","reference_id":"125110","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125110"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397627","reference_id":"2397627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43342"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61854?format=json","vulnerability_id":"VCID-wnxh-854z-ykfk","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04965","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04943","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270","reference_id":"2386270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43211"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64210?format=json","vulnerability_id":"VCID-xpp8-357g-c7gp","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785","reference_id":"2448785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43441"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66431?format=json","vulnerability_id":"VCID-xr5y-1ebg-xqcj","summary":"webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502","reference_id":"","reference_type":"","scores":[{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29431","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300","reference_id":"2416300","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13502","reference_id":"CVE-2025-13502","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-13502"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61853?format=json","vulnerability_id":"VCID-yg6b-hsst-ckaa","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28568","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269","reference_id":"2386269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-31278"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65879?format=json","vulnerability_id":"VCID-z7hw-fywx-dffc","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43535","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11508","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423188","reference_id":"2423188","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995085?format=json","purl":"pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-25ng-4kwb-qfat"},{"vulnerability":"VCID-4k57-k2s6-wkhx"},{"vulnerability":"VCID-7ut5-fu6w-63fs"},{"vulnerability":"VCID-88kv-qter-5fc3"},{"vulnerability":"VCID-8cxd-4p9j-dyf1"},{"vulnerability":"VCID-988h-sqnj-57fg"},{"vulnerability":"VCID-eu4s-vvyf-pqh3"},{"vulnerability":"VCID-ffha-wafn-sqa9"},{"vulnerability":"VCID-fpvs-seby-kfhv"},{"vulnerability":"VCID-gqm2-5nh3-7ufp"},{"vulnerability":"VCID-mmcp-4qnx-5ufh"},{"vulnerability":"VCID-nwkr-s7vs-p7fz"},{"vulnerability":"VCID-t46t-rhgu-cbc1"},{"vulnerability":"VCID-teue-y6qz-jyfw"},{"vulnerability":"VCID-w5gq-k53s-tuc5"},{"vulnerability":"VCID-wrt4-z8ne-zffm"},{"vulnerability":"VCID-x5sh-5xtn-r7cp"},{"vulnerability":"VCID-yfww-r9rn-73dy"},{"vulnerability":"VCID-zk2j-9hd2-hfcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}],"aliases":["CVE-2025-43535"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1"}