[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2023:3233-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":38,"duplicates":39,"related":40,"reserved_at":9,"published_at":53,"modified_at":54,"state":9,"summary":55,"references_raw":57,"kevs":122,"epss":9,"epss_history":123,"metrics":124,"affected":125},"SUSE-SU-2023:3233-1","Security update for webkit2gtk3\n\nThis update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.40.5 (bsc#1213905):\n\n- CVE-2023-38133: Fixed information disclosure.\n- CVE-2023-38572: Fixed Same-Origin-Policy bypass.\n- CVE-2023-38592: Fixed arbitrary code execution.\n- CVE-2023-38594: Fixed arbitrary code execution.\n- CVE-2023-38595: Fixed arbitrary code execution.\n- CVE-2023-38597: Fixed arbitrary code execution.\n- CVE-2023-38599: Fixed sensitive user information tracking.\n- CVE-2023-38600: Fixed arbitrary code execution.\n- CVE-2023-38611: Fixed arbitrary code execution.\n\nUpdate to version 2.40.3 (bsc#1212863):\n\n- CVE-2023-32439: Fixed a bug where processing maliciously crafted web content may lead to arbitrary code execution. (bsc#1212863)\n- CVE-2023-32435: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)\n- CVE-2022-48503: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36],{"_key":15},"CVE-2022-48503",{"_key":17},"CVE-2023-32435",{"_key":19},"CVE-2023-32439",{"_key":21},"CVE-2023-38133",{"_key":23},"CVE-2023-38572",{"_key":25},"CVE-2023-38592",{"_key":27},"CVE-2023-38594",{"_key":29},"CVE-2023-38595",{"_key":31},"CVE-2023-38597",{"_key":33},"CVE-2023-38599",{"_key":35},"CVE-2023-38600",{"_key":37},"CVE-2023-38611",[],[],[41,42,43,44,45,46,47,48,49,50,51,52],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},"2023-08-08T15:35:30Z","2026-02-04T03:15:58.762268Z",{"cisa_kev":56,"cisa_ransomware":56,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[58,64,69,73,78,82,86,90,94,98,102,106,110,114,118],{"url":59,"sources":60,"tags":62},"https://www.suse.com/support/update/announcement/2023/suse-su-20233233-1/",[61],"osv_suse",[63],"Advisory",{"url":65,"sources":66,"tags":67},"https://bugzilla.suse.com/1212863",[61],[68],"REPORT",{"url":70,"sources":71,"tags":72},"https://bugzilla.suse.com/1213905",[61],[68],{"url":74,"sources":75,"tags":76},"https://www.suse.com/security/cve/CVE-2022-48503",[61],[77],"WEB",{"url":79,"sources":80,"tags":81},"https://www.suse.com/security/cve/CVE-2023-32435",[61],[77],{"url":83,"sources":84,"tags":85},"https://www.suse.com/security/cve/CVE-2023-32439",[61],[77],{"url":87,"sources":88,"tags":89},"https://www.suse.com/security/cve/CVE-2023-38133",[61],[77],{"url":91,"sources":92,"tags":93},"https://www.suse.com/security/cve/CVE-2023-38572",[61],[77],{"url":95,"sources":96,"tags":97},"https://www.suse.com/security/cve/CVE-2023-38592",[61],[77],{"url":99,"sources":100,"tags":101},"https://www.suse.com/security/cve/CVE-2023-38594",[61],[77],{"url":103,"sources":104,"tags":105},"https://www.suse.com/security/cve/CVE-2023-38595",[61],[77],{"url":107,"sources":108,"tags":109},"https://www.suse.com/security/cve/CVE-2023-38597",[61],[77],{"url":111,"sources":112,"tags":113},"https://www.suse.com/security/cve/CVE-2023-38599",[61],[77],{"url":115,"sources":116,"tags":117},"https://www.suse.com/security/cve/CVE-2023-38600",[61],[77],{"url":119,"sources":120,"tags":121},"https://www.suse.com/security/cve/CVE-2023-38611",[61],[77],[],[],[],[126,139,143,147,151,155,159,163,167,171],{"ecosystem":127,"name":128,"vendor":129,"product":130,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":130,"source":9,"versions":132},"SUSE Linux Enterprise","webkit2gtk3","suse","webkit2gtk3&distro=SUSE Enterprise Storage 7.1","rpm",[133],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},"lt2_40_5_150200_78_1",true,"ecosystem","2.40.5-150200.78.1","excluding",{"ecosystem":127,"name":128,"vendor":129,"product":140,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":140,"source":9,"versions":141},"webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",[142],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":144,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":144,"source":9,"versions":145},"webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",[146],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":148,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":148,"source":9,"versions":149},"webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",[150],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":152,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":152,"source":9,"versions":153},"webkit2gtk3&distro=SUSE Linux Enterprise Server 15 SP2-LTSS",[154],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":156,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":156,"source":9,"versions":157},"webkit2gtk3&distro=SUSE Linux Enterprise Server 15 SP3-LTSS",[158],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":160,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":160,"source":9,"versions":161},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP2",[162],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":164,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":164,"source":9,"versions":165},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3",[166],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":168,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":168,"source":9,"versions":169},"webkit2gtk3&distro=SUSE Manager Proxy 4.2",[170],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9},{"ecosystem":127,"name":128,"vendor":129,"product":172,"cpe_part":9,"purl_type":131,"purl_namespace":129,"purl_name":172,"source":9,"versions":173},"webkit2gtk3&distro=SUSE Manager Server 4.2",[174],{"version":134,"is_range":135,"range_type":136,"version_start":9,"version_start_type":9,"version_end":137,"version_end_type":138,"fixed_in":9}]