Search for vulnerabilities
Vulnerability details: VCID-kpeu-3svw-j3hb
Vulnerability ID VCID-kpeu-3svw-j3hb
Aliases CVE-2024-44192
Summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00041 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2024-44192
cvssv3.1 6.5 https://support.apple.com/en-us/121238
ssvc Track https://support.apple.com/en-us/121238
cvssv3.1 6.5 https://support.apple.com/en-us/121240
ssvc Track https://support.apple.com/en-us/121240
cvssv3.1 6.5 https://support.apple.com/en-us/121241
ssvc Track https://support.apple.com/en-us/121241
cvssv3.1 6.5 https://support.apple.com/en-us/121248
ssvc Track https://support.apple.com/en-us/121248
cvssv3.1 6.5 https://support.apple.com/en-us/121249
ssvc Track https://support.apple.com/en-us/121249
cvssv3.1 6.5 https://support.apple.com/en-us/121250
ssvc Track https://support.apple.com/en-us/121250
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
https://api.first.org/data/v1/epss?cve=CVE-2024-44192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://support.apple.com/en-us/121238
https://support.apple.com/en-us/121240
https://support.apple.com/en-us/121241
https://support.apple.com/en-us/121248
https://support.apple.com/en-us/121249
https://support.apple.com/en-us/121250
2353871 https://bugzilla.redhat.com/show_bug.cgi?id=2353871
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2024-44192 https://nvd.nist.gov/vuln/detail/CVE-2024-44192
RHSA-2025:3713 https://access.redhat.com/errata/RHSA-2025:3713
RHSA-2025:3755 https://access.redhat.com/errata/RHSA-2025:3755
RHSA-2025:3756 https://access.redhat.com/errata/RHSA-2025:3756
RHSA-2025:3974 https://access.redhat.com/errata/RHSA-2025:3974
RHSA-2025:4445 https://access.redhat.com/errata/RHSA-2025:4445
RHSA-2025:7387 https://access.redhat.com/errata/RHSA-2025:7387
RHSA-2025:7998 https://access.redhat.com/errata/RHSA-2025:7998
RHSA-2025:8064 https://access.redhat.com/errata/RHSA-2025:8064
RHSA-2025:8065 https://access.redhat.com/errata/RHSA-2025:8065
RHSA-2025:8066 https://access.redhat.com/errata/RHSA-2025:8066
RHSA-2025:8194 https://access.redhat.com/errata/RHSA-2025:8194
USN-7395-1 https://usn.ubuntu.com/7395-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-44192
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121238
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121238
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121240
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121240
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121241
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121241
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121248
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121248
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121249
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121249
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121250
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121250
Exploit Prediction Scoring System (EPSS)
Percentile 0.1013
EPSS Score 0.00037
Published At April 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-03-28T05:41:55.067914+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json 36.0.0