[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2024:0519-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T15:11:42.125Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":26,"duplicates":27,"related":28,"reserved_at":9,"published_at":35,"modified_at":36,"state":9,"summary":37,"references_raw":39,"kevs":80,"epss":9,"epss_history":81,"metrics":82,"affected":83},"SUSE-SU-2024:0519-1","Security update for webkit2gtk3\n\nThis update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.42.5 (bsc#1219604):\n\n- CVE-2024-23222: Fixed processing maliciously crafted web content that may have led to arbitrary code execution (bsc#1219113).\n- CVE-2024-23206: Fixed fingerprint user via maliciously crafted webpages (bsc#1219604).\n- CVE-2024-23213: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).\n- CVE-2023-40414: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).\n- CVE-2014-1745: Fixed denial-of-service or potentially disclose memory contents while processing maliciously crafted files (bsc#1219604).\n- CVE-2023-42833: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).\n",null,[],[],[],[14,16,18,20,22,24],{"_key":15},"CVE-2014-1745",{"_key":17},"CVE-2023-40414",{"_key":19},"CVE-2023-42833",{"_key":21},"CVE-2024-23206",{"_key":23},"CVE-2024-23213",{"_key":25},"CVE-2024-23222",[],[],[29,30,31,32,33,34],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},"2024-02-15T16:52:44Z","2026-02-04T02:22:42.518381Z",{"cisa_kev":38,"cisa_ransomware":38,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[40,46,51,55,60,64,68,72,76],{"url":41,"sources":42,"tags":44},"https://www.suse.com/support/update/announcement/2024/suse-su-20240519-1/",[43],"osv_suse",[45],"Advisory",{"url":47,"sources":48,"tags":49},"https://bugzilla.suse.com/1219113",[43],[50],"REPORT",{"url":52,"sources":53,"tags":54},"https://bugzilla.suse.com/1219604",[43],[50],{"url":56,"sources":57,"tags":58},"https://www.suse.com/security/cve/CVE-2014-1745",[43],[59],"WEB",{"url":61,"sources":62,"tags":63},"https://www.suse.com/security/cve/CVE-2023-40414",[43],[59],{"url":65,"sources":66,"tags":67},"https://www.suse.com/security/cve/CVE-2023-42833",[43],[59],{"url":69,"sources":70,"tags":71},"https://www.suse.com/security/cve/CVE-2024-23206",[43],[59],{"url":73,"sources":74,"tags":75},"https://www.suse.com/security/cve/CVE-2024-23213",[43],[59],{"url":77,"sources":78,"tags":79},"https://www.suse.com/security/cve/CVE-2024-23222",[43],[59],[],[],[],[84,97,101,105,109,113,117],{"ecosystem":85,"name":86,"vendor":87,"product":88,"cpe_part":9,"purl_type":89,"purl_namespace":87,"purl_name":88,"source":9,"versions":90},"SUSE Linux Enterprise","webkit2gtk3","suse","webkit2gtk3&distro=SUSE Enterprise Storage 7.1","rpm",[91],{"version":92,"is_range":93,"range_type":94,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},"lt2_42_5_150200_104_1",true,"ecosystem","2.42.5-150200.104.1","excluding",{"ecosystem":85,"name":86,"vendor":87,"product":98,"cpe_part":9,"purl_type":89,"purl_namespace":87,"purl_name":98,"source":9,"versions":99},"webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",[100],{"version":92,"is_range":93,"range_type":94,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},{"ecosystem":85,"name":86,"vendor":87,"product":102,"cpe_part":9,"purl_type":89,"purl_namespace":87,"purl_name":102,"source":9,"versions":103},"webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",[104],{"version":92,"is_range":93,"range_type":94,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},{"ecosystem":85,"name":86,"vendor":87,"product":106,"cpe_part":9,"purl_type":89,"purl_namespace":87,"purl_name":106,"source":9,"versions":107},"webkit2gtk3&distro=SUSE Linux Enterprise Server 15 SP2-LTSS",[108],{"version":92,"is_range":93,"range_type":94,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},{"ecosystem":85,"name":86,"vendor":87,"product":110,"cpe_part":9,"purl_type":89,"purl_namespace":87,"purl_name":110,"source":9,"versions":111},"webkit2gtk3&distro=SUSE Linux Enterprise Server 15 SP3-LTSS",[112],{"version":92,"is_range":93,"range_type":94,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},{"ecosystem":85,"name":86,"vendor":87,"product":114,"cpe_part":9,"purl_type":89,"purl_namespace":87,"purl_name":114,"source":9,"versions":115},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP2",[116],{"version":92,"is_range":93,"range_type":94,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},{"ecosystem":85,"name":86,"vendor":87,"product":118,"cpe_part":9,"purl_type":89,"purl_namespace":87,"purl_name":118,"source":9,"versions":119},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3",[120],{"version":92,"is_range":93,"range_type":94,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9}]