Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/104854?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/104854?format=api", "purl": "pkg:rpm/redhat/gdk-pixbuf2@2.36.12-5?arch=el8", "type": "rpm", "namespace": "redhat", "name": "gdk-pixbuf2", "version": "2.36.12-5", "qualifiers": { "arch": "el8" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82541?format=api", "vulnerability_id": "VCID-1nz3-m4qr-eub9", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8608.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8608.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8608", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73424", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73455", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73428", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73503", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73483", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73517", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73527", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.7352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00767", "scoring_system": "epss", "scoring_elements": "0.73553", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876898", "reference_id": "1876898", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876898" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8608" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1nz3-m4qr-eub9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33807?format=api", "vulnerability_id": "VCID-244h-dfjr-affw", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8524.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74653", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74674", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74697", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74676", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74668", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74705", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74713", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74704", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.7474", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719209", "reference_id": "1719209", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719209" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8524" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-244h-dfjr-affw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33806?format=api", "vulnerability_id": "VCID-2r99-q3uw-37cf", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8523.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8523.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8523", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79529", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79536", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79545", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79608", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.7961", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79642", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8523" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719208", "reference_id": "1719208", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719208" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8523" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2r99-q3uw-37cf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82542?format=api", "vulnerability_id": "VCID-31f3-9djw-hyf9", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8609.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8609.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8609", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876899", "reference_id": "1876899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8609" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-31f3-9djw-hyf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33797?format=api", "vulnerability_id": "VCID-3ejm-7bb5-ebfh", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11070.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11070.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11070", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83309", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83283", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83284", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83285", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83247", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11070" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=193718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=193718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Apr/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Apr/21" }, { "reference_url": "https://trac.webkit.org/changeset/243197/webkit", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/243197/webkit" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/04/11/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709289", "reference_id": "1709289", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709289" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11070", "reference_id": "CVE-2019-11070", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11070" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-11070" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ejm-7bb5-ebfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33816?format=api", "vulnerability_id": "VCID-5q5f-yeeg-mydr", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8595.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8595.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8595", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876892", "reference_id": "1876892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876892" }, { "reference_url": "https://security.archlinux.org/ASA-201905-10", "reference_id": "ASA-201905-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201905-10" }, { "reference_url": "https://security.archlinux.org/AVG-967", "reference_id": "AVG-967", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-967" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3992-1/", "reference_id": "USN-3992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3992-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8595" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q5f-yeeg-mydr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33810?format=api", "vulnerability_id": "VCID-6ufb-fw7y-6ybf", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8544.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8544.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8544", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81409", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81453", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81454", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81455", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81477", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719224", "reference_id": "1719224", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719224" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8544" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufb-fw7y-6ybf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33811?format=api", "vulnerability_id": "VCID-6vsc-9aez-kqe7", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67762", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67746", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67713", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67761", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67742", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70715", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70753", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70674", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.7067", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719238", "reference_id": "1719238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719238" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8551" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vsc-9aez-kqe7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63534?format=api", "vulnerability_id": "VCID-8ern-kbeb-j3e2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11459.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11459.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11459", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.62992", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.6308", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63096", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63112", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.6313", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63116", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11459" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716295", "reference_id": "1716295", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716295" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927820", "reference_id": "927820", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927820" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927821", "reference_id": "927821", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1074", "reference_id": "RHSA-2020:1074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1074" }, { "reference_url": "https://usn.ubuntu.com/3959-1/", "reference_id": "USN-3959-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3959-1/" }, { "reference_url": "https://usn.ubuntu.com/7274-1/", "reference_id": "USN-7274-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7274-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-11459" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ern-kbeb-j3e2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46103?format=api", "vulnerability_id": "VCID-8p2f-tu4a-jqa2", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8735.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78043", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.7808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78089", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78093", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78119", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78101", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78133", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78126", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01106", "scoring_system": "epss", "scoring_elements": "0.78159", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876614", "reference_id": "1876614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876614" }, { "reference_url": "https://security.gentoo.org/glsa/202003-22", "reference_id": "GLSA-202003-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8735" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p2f-tu4a-jqa2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33827?format=api", "vulnerability_id": "VCID-8sw9-7en6-3kg8", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96171", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.9619", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.962", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96203", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96207", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96222", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25381", "scoring_system": "epss", "scoring_elements": "0.96223", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876632", "reference_id": "1876632", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876632" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1822", "reference_id": "CVE-2019-8671", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1822" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47190.txt", "reference_id": "CVE-2019-8671", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47190.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8671" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8sw9-7en6-3kg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82799?format=api", "vulnerability_id": "VCID-8za5-vf91-4ke3", "summary": "gnome-shell: partial lock screen bypass", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3820.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3820.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13694", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13707", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13569", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1364", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13845", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13777", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13745", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3820" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.gnome.org/GNOME/gnome-shell/issues/851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gitlab.gnome.org/GNOME/gnome-shell/issues/851" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669391", "reference_id": "1669391", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669391" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921490", "reference_id": "921490", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921490" }, { "reference_url": "https://security.archlinux.org/ASA-201903-3", "reference_id": "ASA-201903-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201903-3" }, { "reference_url": "https://security.archlinux.org/AVG-879", "reference_id": "AVG-879", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-879" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gnome-shell:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3820", "reference_id": "CVE-2019-3820", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" }, { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1021", "reference_id": "RHSA-2020:1021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1021" }, { "reference_url": "https://usn.ubuntu.com/3966-1/", "reference_id": "USN-3966-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3966-1/" }, { "reference_url": "https://usn.ubuntu.com/7052-1/", "reference_id": "USN-7052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7052-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-3820" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8za5-vf91-4ke3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33844?format=api", "vulnerability_id": "VCID-9cya-3fan-c7cw", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8689.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8689.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96626", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96636", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96641", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96657", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.9666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96675", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.30057", "scoring_system": "epss", "scoring_elements": "0.96673", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876657", "reference_id": "1876657", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876657" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1876", "reference_id": "CVE-2019-8689", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1876" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47316.txt", "reference_id": "CVE-2019-8689", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47316.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/4130-1/", "reference_id": "USN-4130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4130-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8689" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cya-3fan-c7cw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33812?format=api", "vulnerability_id": "VCID-arqg-dzcf-vfby", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94578", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94594", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94608", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94628", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94631", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94636", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94637", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719231", "reference_id": "1719231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719231" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1783", "reference_id": "CVE-2019-8558", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1783" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46650.js", "reference_id": "CVE-2019-8558", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46650.js" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8558" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arqg-dzcf-vfby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82546?format=api", "vulnerability_id": "VCID-bt7n-px76-uqg7", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8622.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8622.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8622", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.9607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96099", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96102", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96105", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96117", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96123", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96124", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877048", "reference_id": "1877048", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877048" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1802", "reference_id": "CVE-2019-8622", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1802" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46888.txt", "reference_id": "CVE-2019-8622", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46888.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8622" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bt7n-px76-uqg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33840?format=api", "vulnerability_id": "VCID-cdr5-sykg-6bad", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8686.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8686.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876653", "reference_id": "1876653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876653" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8686" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cdr5-sykg-6bad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82539?format=api", "vulnerability_id": "VCID-ch8p-x1qa-m7eh", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8597.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8597.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8597", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72577", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.7271", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876894", "reference_id": "1876894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8597" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ch8p-x1qa-m7eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82537?format=api", "vulnerability_id": "VCID-csmj-rvnt-tkb8", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8594.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8594.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876891", "reference_id": "1876891", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8594" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-csmj-rvnt-tkb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33833?format=api", "vulnerability_id": "VCID-dyra-kzhh-gfah", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8677.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8677.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876645", "reference_id": "1876645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876645" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8677" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dyra-kzhh-gfah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33805?format=api", "vulnerability_id": "VCID-e48x-t771-5yhj", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8518.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8518.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8518", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97478", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97488", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97489", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97492", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97494", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97495", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97503", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97505", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.43155", "scoring_system": "epss", "scoring_elements": "0.97506", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8518" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719206", "reference_id": "1719206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719206" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1775", "reference_id": "CVE-2019-8518", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1775" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46649.js", "reference_id": "CVE-2019-8518", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46649.js" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8518" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e48x-t771-5yhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33808?format=api", "vulnerability_id": "VCID-eefe-ax79-xyfa", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84129", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84221", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84222", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84251", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719210", "reference_id": "1719210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719210" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8535" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eefe-ax79-xyfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82534?format=api", "vulnerability_id": "VCID-exhy-s878-rbas", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8584.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8584.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8584", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876883", "reference_id": "1876883", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8584" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exhy-s878-rbas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82547?format=api", "vulnerability_id": "VCID-f819-c4p6-ubfq", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.9607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96099", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96102", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96105", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96117", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96123", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.24382", "scoring_system": "epss", "scoring_elements": "0.96124", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877049", "reference_id": "1877049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877049" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1789", "reference_id": "CVE-2019-8623", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1789" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46889.txt", "reference_id": "CVE-2019-8623", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46889.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8623" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f819-c4p6-ubfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33837?format=api", "vulnerability_id": "VCID-f8nj-ksw6-n7h9", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8681.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8681.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876650", "reference_id": "1876650", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876650" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/4130-1/", "reference_id": "USN-4130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4130-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8681" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f8nj-ksw6-n7h9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82533?format=api", "vulnerability_id": "VCID-f99h-gg2d-s3dq", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8583.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8583.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8583", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74345", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74377", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74351", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74383", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74399", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.7442", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74391", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74428", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74437", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74427", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74461", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876882", "reference_id": "1876882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876882" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8583" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f99h-gg2d-s3dq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82540?format=api", "vulnerability_id": "VCID-fk3u-6j42-s3ca", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92831", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92839", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92842", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.9284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92868", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92869", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.92874", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09556", "scoring_system": "epss", "scoring_elements": "0.9288", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876895", "reference_id": "1876895", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876895" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8601" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fk3u-6j42-s3ca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33818?format=api", "vulnerability_id": "VCID-ftth-y1zp-tydk", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8607.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8607.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8607", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71713", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71682", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71668", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71677", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876897", "reference_id": "1876897", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876897" }, { "reference_url": "https://security.archlinux.org/ASA-201905-10", "reference_id": "ASA-201905-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201905-10" }, { "reference_url": "https://security.archlinux.org/AVG-967", "reference_id": "AVG-967", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-967" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3992-1/", "reference_id": "USN-3992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3992-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8607" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftth-y1zp-tydk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33803?format=api", "vulnerability_id": "VCID-h1tw-vmek-73b6", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8506.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92104", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92111", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92148", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92117", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.9214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92147", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92144", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719199", "reference_id": "1719199", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719199" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1753", "reference_id": "CVE-2019-8506", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1753" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46647.js", "reference_id": "CVE-2019-8506", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46647.js" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://support.apple.com/HT209599", "reference_id": "HT209599", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209599" }, { "reference_url": "https://support.apple.com/HT209601", "reference_id": "HT209601", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209601" }, { "reference_url": "https://support.apple.com/HT209602", "reference_id": "HT209602", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209602" }, { "reference_url": "https://support.apple.com/HT209603", "reference_id": "HT209603", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209603" }, { "reference_url": "https://support.apple.com/HT209604", "reference_id": "HT209604", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209604" }, { "reference_url": "https://support.apple.com/HT209605", "reference_id": "HT209605", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8506" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h1tw-vmek-73b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82538?format=api", "vulnerability_id": "VCID-h4t2-sk5x-byex", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876893", "reference_id": "1876893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8596" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h4t2-sk5x-byex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33830?format=api", "vulnerability_id": "VCID-krjs-d9zg-7ffn", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8673.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876643", "reference_id": "1876643", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876643" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/4130-1/", "reference_id": "USN-4130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4130-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8673" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krjs-d9zg-7ffn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82544?format=api", "vulnerability_id": "VCID-kxbt-pm3m-xyb6", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8611.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8611.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8611", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96159", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96167", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96177", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96187", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.9619", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96194", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96193", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96196", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96205", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96209", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.25276", "scoring_system": "epss", "scoring_elements": "0.96211", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877046", "reference_id": "1877046", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877046" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1788", "reference_id": "CVE-2019-8611", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1788" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46890.txt", "reference_id": "CVE-2019-8611", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46890.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8611" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kxbt-pm3m-xyb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33841?format=api", "vulnerability_id": "VCID-meaw-zpeq-cqem", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8687.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8687.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876655", "reference_id": "1876655", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876655" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/4130-1/", "reference_id": "USN-4130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4130-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8687" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-meaw-zpeq-cqem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33823?format=api", "vulnerability_id": "VCID-n9ma-49su-hfex", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8666.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876630", "reference_id": "1876630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876630" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/4130-1/", "reference_id": "USN-4130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4130-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8666" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n9ma-49su-hfex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33815?format=api", "vulnerability_id": "VCID-p185-6wtn-tbc2", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8563.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8563.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8563", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719237", "reference_id": "1719237", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719237" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8563" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p185-6wtn-tbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82535?format=api", "vulnerability_id": "VCID-pbf7-sjre-c3de", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876884", "reference_id": "1876884", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8586" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbf7-sjre-c3de" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46134?format=api", "vulnerability_id": "VCID-pk5z-rd49-4bbp", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8768.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8768.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8768", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66308", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66347", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66344", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66392", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66406", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66426", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66419", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66436", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66444", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8768" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876616", "reference_id": "1876616", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876616" }, { "reference_url": "https://security.gentoo.org/glsa/202003-22", "reference_id": "GLSA-202003-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8768" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pk5z-rd49-4bbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33835?format=api", "vulnerability_id": "VCID-pp9f-811d-qfda", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8679.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8679.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876647", "reference_id": "1876647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876647" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8679" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pp9f-811d-qfda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82531?format=api", "vulnerability_id": "VCID-qmnr-9wmw-rub9", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6237.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6237.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6237", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876880", "reference_id": "1876880", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-6237" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmnr-9wmw-rub9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33832?format=api", "vulnerability_id": "VCID-r9h1-ghmu-pkg9", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8676.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8676.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87151", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87162", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87179", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87196", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87203", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87205", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.8722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87225", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87219", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03291", "scoring_system": "epss", "scoring_elements": "0.87237", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876644", "reference_id": "1876644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876644" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/4130-1/", "reference_id": "USN-4130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4130-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8676" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9h1-ghmu-pkg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33845?format=api", "vulnerability_id": "VCID-rnz6-454a-pqb4", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8690.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8690.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92127", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92134", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92141", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92157", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.9216", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92164", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.9217", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08113", "scoring_system": "epss", "scoring_elements": "0.92175", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876664", "reference_id": "1876664", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876664" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1880", "reference_id": "CVE-2019-8690", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1880" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47237.txt", "reference_id": "CVE-2019-8690", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47237.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/4130-1/", "reference_id": "USN-4130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4130-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8690" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rnz6-454a-pqb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46092?format=api", "vulnerability_id": "VCID-rqby-uatn-kuh6", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8726.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8726.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78361", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78367", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78382", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78414", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.7844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78422", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78443", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78442", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.78437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0114", "scoring_system": "epss", "scoring_elements": "0.7847", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876612", "reference_id": "1876612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876612" }, { "reference_url": "https://security.gentoo.org/glsa/202003-22", "reference_id": "GLSA-202003-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8726" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqby-uatn-kuh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82536?format=api", "vulnerability_id": "VCID-ubdh-y6fd-bbhd", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8587.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8587.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8587", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876887", "reference_id": "1876887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8587" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubdh-y6fd-bbhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82545?format=api", "vulnerability_id": "VCID-vffr-t21y-wfap", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8619.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877047", "reference_id": "1877047", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8619" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vffr-t21y-wfap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33809?format=api", "vulnerability_id": "VCID-wbba-68wb-z7bs", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8536.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80843", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.8087", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80879", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80895", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80909", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80912", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80913", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80934", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719213", "reference_id": "1719213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719213" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8536" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbba-68wb-z7bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82496?format=api", "vulnerability_id": "VCID-wgka-2er4-abd6", "summary": "gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12795.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12795.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12795", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18661", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23928", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24093", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2399", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23963", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23916", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12795" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1726505", "reference_id": "1726505", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1726505" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930376", "reference_id": "930376", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930376" }, { "reference_url": "https://security.archlinux.org/AVG-1007", "reference_id": "AVG-1007", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://usn.ubuntu.com/4053-1/", "reference_id": "USN-4053-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4053-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-12795" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wgka-2er4-abd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33814?format=api", "vulnerability_id": "VCID-ws98-vxe9-1fhq", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8559.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719235", "reference_id": "1719235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719235" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8559" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws98-vxe9-1fhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33819?format=api", "vulnerability_id": "VCID-xke9-ur3v-w7ds", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8615.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8615.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8615", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72577", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.72668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00728", "scoring_system": "epss", "scoring_elements": "0.7271", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877045", "reference_id": "1877045", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877045" }, { "reference_url": "https://security.archlinux.org/ASA-201905-10", "reference_id": "ASA-201905-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201905-10" }, { "reference_url": "https://security.archlinux.org/AVG-967", "reference_id": "AVG-967", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-967" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3992-1/", "reference_id": "USN-3992-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3992-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8615" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xke9-ur3v-w7ds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33829?format=api", "vulnerability_id": "VCID-yukj-47py-gbe8", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8672.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97394", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97405", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97407", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97414", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97417", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97419", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.9742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97428", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97432", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.41725", "scoring_system": "epss", "scoring_elements": "0.97431", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876634", "reference_id": "1876634", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876634" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1825", "reference_id": "CVE-2019-8672", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1825" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47191.txt", "reference_id": "CVE-2019-8672", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47191.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8672" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yukj-47py-gbe8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82543?format=api", "vulnerability_id": "VCID-zsp5-c993-cyep", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8610.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8610.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8610", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876900", "reference_id": "1876900", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876900" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8610" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zsp5-c993-cyep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33799?format=api", "vulnerability_id": "VCID-zwdq-utma-yqaf", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6251.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6251.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6251", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85123", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85194", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85215", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85216", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85185", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85197", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6251" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=194208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=194208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251" }, { "reference_url": "https://gitlab.gnome.org/GNOME/epiphany/issues/532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gitlab.gnome.org/GNOME/epiphany/issues/532" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Apr/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Apr/21" }, { "reference_url": "https://trac.webkit.org/changeset/243434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/243434" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/04/11/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667409", "reference_id": "1667409", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667409" }, { "reference_url": "https://security.archlinux.org/AVG-851", "reference_id": "AVG-851", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-851" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6251", "reference_id": "CVE-2019-6251", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6251" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2019-6251" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zwdq-utma-yqaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82532?format=api", "vulnerability_id": "VCID-zykf-scpy-6ud1", "summary": "webkitgtk: Multiple memory corruption issues leading to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8571.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8571.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8571", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74313", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876881", "reference_id": "1876881", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" } ], "fixed_packages": [], "aliases": [ "CVE-2019-8571" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zykf-scpy-6ud1" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gdk-pixbuf2@2.36.12-5%3Farch=el8" }