[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2023:4211-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":30,"duplicates":31,"related":32,"reserved_at":9,"published_at":41,"modified_at":42,"state":9,"summary":43,"references_raw":45,"kevs":130,"epss":9,"epss_history":131,"metrics":132,"affected":133},"SUSE-SU-2023:4211-1","Security update for webkit2gtk3\n\nThis update for webkit2gtk3 fixes the following issues:\n\n- CVE-2023-41993: Fixed an issue where processing malicious web\n  content could have lead to arbitrary code execution (bsc#1215661).\n- CVE-2023-39928: Fixed a use-after-free that could be exploited to\n  execute arbitrary code when visiting a malicious webpage\n  (bsc#1215868).\n- CVE-2023-41074: Fixed an issue where processing malicious web\n  content could have lead to arbitrary code execution (bsc#1215870).\n\nNon-security fixes:\n\n- Fixed missing package dependencies (bsc#1215072).\n",null,[],[],[],[14,16,18,20,22,24,26,28],{"_key":15},"CVE-2023-32393",{"_key":17},"CVE-2023-35074",{"_key":19},"CVE-2023-37450",{"_key":21},"CVE-2023-39434",{"_key":23},"CVE-2023-39928",{"_key":25},"CVE-2023-40451",{"_key":27},"CVE-2023-41074",{"_key":29},"CVE-2023-41993",[],[],[33,34,35,36,37,38,39,40],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},"2023-10-26T08:28:14Z","2026-02-04T03:48:48.728223Z",{"cisa_kev":44,"cisa_ransomware":44,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[46,52,57,61,65,69,73,77,81,85,89,93,97,102,106,110,114,118,122,126],{"url":47,"sources":48,"tags":50},"https://www.suse.com/support/update/announcement/2023/suse-su-20234211-1/",[49],"osv_suse",[51],"Advisory",{"url":53,"sources":54,"tags":55},"https://bugzilla.suse.com/1213379",[49],[56],"REPORT",{"url":58,"sources":59,"tags":60},"https://bugzilla.suse.com/1213581",[49],[56],{"url":62,"sources":63,"tags":64},"https://bugzilla.suse.com/1213905",[49],[56],{"url":66,"sources":67,"tags":68},"https://bugzilla.suse.com/1215072",[49],[56],{"url":70,"sources":71,"tags":72},"https://bugzilla.suse.com/1215661",[49],[56],{"url":74,"sources":75,"tags":76},"https://bugzilla.suse.com/1215866",[49],[56],{"url":78,"sources":79,"tags":80},"https://bugzilla.suse.com/1215867",[49],[56],{"url":82,"sources":83,"tags":84},"https://bugzilla.suse.com/1215868",[49],[56],{"url":86,"sources":87,"tags":88},"https://bugzilla.suse.com/1215869",[49],[56],{"url":90,"sources":91,"tags":92},"https://bugzilla.suse.com/1215870",[49],[56],{"url":94,"sources":95,"tags":96},"https://bugzilla.suse.com/1216483",[49],[56],{"url":98,"sources":99,"tags":100},"https://www.suse.com/security/cve/CVE-2023-32393",[49],[101],"WEB",{"url":103,"sources":104,"tags":105},"https://www.suse.com/security/cve/CVE-2023-35074",[49],[101],{"url":107,"sources":108,"tags":109},"https://www.suse.com/security/cve/CVE-2023-37450",[49],[101],{"url":111,"sources":112,"tags":113},"https://www.suse.com/security/cve/CVE-2023-39434",[49],[101],{"url":115,"sources":116,"tags":117},"https://www.suse.com/security/cve/CVE-2023-39928",[49],[101],{"url":119,"sources":120,"tags":121},"https://www.suse.com/security/cve/CVE-2023-40451",[49],[101],{"url":123,"sources":124,"tags":125},"https://www.suse.com/security/cve/CVE-2023-41074",[49],[101],{"url":127,"sources":128,"tags":129},"https://www.suse.com/security/cve/CVE-2023-41993",[49],[101],[],[],[],[134,147,151],{"ecosystem":135,"name":136,"vendor":137,"product":138,"cpe_part":9,"purl_type":139,"purl_namespace":137,"purl_name":138,"source":9,"versions":140},"SUSE Linux Enterprise","webkit2gtk3","suse","webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS","rpm",[141],{"version":142,"is_range":143,"range_type":144,"version_start":9,"version_start_type":9,"version_end":145,"version_end_type":146,"fixed_in":9},"lt2_42_1_150000_3_153_1",true,"ecosystem","2.42.1-150000.3.153.1","excluding",{"ecosystem":135,"name":136,"vendor":137,"product":148,"cpe_part":9,"purl_type":139,"purl_namespace":137,"purl_name":148,"source":9,"versions":149},"webkit2gtk3&distro=SUSE Linux Enterprise Server 15 SP1-LTSS",[150],{"version":142,"is_range":143,"range_type":144,"version_start":9,"version_start_type":9,"version_end":145,"version_end_type":146,"fixed_in":9},{"ecosystem":135,"name":136,"vendor":137,"product":152,"cpe_part":9,"purl_type":139,"purl_namespace":137,"purl_name":152,"source":9,"versions":153},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP1",[154],{"version":142,"is_range":143,"range_type":144,"version_start":9,"version_start_type":9,"version_end":145,"version_end_type":146,"fixed_in":9}]